Ccna 200 125 2 Dec PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 238

CCNA(200-125)题库V3.0(2019.12.

02)

Number: 200-125
Passing Score: 810
Time Limit: 120 min
File Version: v3.0

CCNA(200-125)题库V3.0(2019.12.02)

新版CCNA 考试交流QQ群 :482070356

CCNA 最新题库/最新战报 发布区: http://bbs.hh010.com/forum-261-1.html

下载官方正版题库、看最新考试战报,请随时关注 鸿鹄论坛 http://bbs.hh010.com

思科华为考试报名、题库更新请联系鸿鹄全国区客服
QQ 613523101
QQ 613523103
QQ 613523105
QQ 613523107
QQ 613523108
QQ 613523109
鸿鹄论坛官方淘宝店铺:http://hh010.taobao.com/

鸿鹄论坛官方微信公众号:

========================================
注意:思科发布最新的CCNA版本是V3.0,考试代号200-125,V3.0为目前最新官方正版题库,
思科目前并没有发布V3.1、V4.0等版本。
更新内容:
增加新题
增加新题
修改错误答案
=============================================

Sections
1. part 1
2. part 2
3. part 3
选择题

QUESTION 1
Which technology supports the stateless assignment of IPv6 addresses?(Choose two.)

A. DNS
B. DHCPv6
C. DHCP
D. autoconfiguration

Correct Answer: BD
Section: part 1
Explanation

Explanation/Reference:

QUESTION 2
After you configure the Loopback0 interface, which command can you enter to verify the
status of the interface and determine whether fast switching is enabled?

A. Router#show ip interface loopback 0


B. Router#show run
C. Router#show interface loopback 0
D. Router#show ip interface brief

Correct Answer: A
Section: part 1
Explanation

Explanation/Reference:

QUESTION 3
What are two requirements for an HSRP group? (Choose two.)

A. exactly one active router


B. one or more standby routers
C. one or more backup virtual routers
D. exactly one standby active router
E. exactly one backup virtual router

Correct Answer: AD
Section: part 1
Explanation

Explanation/Reference:

QUESTION 4
Which command sequence can you enter to create VLAN 20 and assign it to an
interface on a switch?
A. Switch(config)#vlan 20
Switch(config)#Interface gig x/y
Switch(config-if)#switchport access vlan 20
B. Switch(config)#Interface gig x/y
Switch(config-if)#vlan 20
Switch(config-vlan)#switchport access vlan 20
C. Switch(config)#vlan 20
Switch(config)#Interface vlan 20
Switch(config-if)#switchport trunk native vlan 20
D. Switch(config)#vlan 20
Switch(config)#Interface vlan 20
Switch(config-if)#switchport access vlan 20
E. Switch(config)#vlan 20
Switch(config)#Interface vlan 20
Switch(config-if)#switchport trunk allowed vlan 20

Correct Answer: A
Section: part 1
Explanation

Explanation/Reference:

QUESTION 5
Which three commands can you use to set a router boot image? (Choose three.)

A. Router(config)# boot system flash c4500-p-mz.121-20.bin


B. Router(config)# boot system tftp c7300-js-mz.122-33.SB8a.bin
C. Router(config)#boot system rom c7301-advipservicesk9-mz.124-24.T4.bin
D. Router> boot flash:c180x-adventerprisek9-mz-124-6T.bin
E. Router(config)#boot flash:c180x-adventerprisek9-mz-124-6T.bin
F. Router(config)#boot bootldr bootflash:c4500-jk9s-mz.122-23f.bin

Correct Answer: ABC


Section: part 1
Explanation

Explanation/Reference:

QUESTION 6
Which two statements about IPv6 and routing protocols are true? (Choose two.)

A. EIGRPv3 was developed to support IPv6 routing.


B. OSPFv3 was developed to support IPv6 routing.
C. Loopback addresses are used to form routing adjacencies.
D. EIGRP, OSPF, and BGP are the only routing protocols that support IPv6.
E. Link-local addresses are used to form routing adjacencies.

Correct Answer: BE
Section: part 1
Explanation

Explanation/Reference:
-----------鸿鹄论坛:http://bbs.hh010.com/
QUESTION 7
If primary and secondary root switches with priority 16384 both experience catastrophic
losses, which tertiary switch can take over?

A. a switch with priority 20480


B. a switch with priority 8192
C. a switch with priority 4096
D. a switch with priority 12288

Correct Answer: A
Section: part 1
Explanation

Explanation/Reference:
题目前提是优先级16384是跟桥,所有其他交换机优先级必须大于16384才能使其成为跟桥

QUESTION 8
Which two statements about late collisions are true? (Choose two.)

A. They may indicate a duplex mismatch.


B. By definition, they occur after the 512th bit of the frame has been transmitted.
C. They indicate received frames that did not pass the FCS match.
D. They are frames that exceed 1518 bytes.
E. They occur when CRC errors and interference occur on the cable.

Correct Answer: AB
Section: part 1
Explanation

Explanation/Reference:

QUESTION 9
Which command can you enter to set the default route for all traffic to an interface?

A. router(config)#ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1


B. router(config)#ip route 0.0.0.0 255.255.255.255 GigabitEthernet0/1
C. router(config-router)#default-information originate
D. router(config-router)#default-information originate always

Correct Answer: A
Section: part 1
Explanation

Explanation/Reference:

QUESTION 10
Which two spanning-tree port states does RSTP combine to allow faster convergence?
(Choose two.)

A. blocking
B. listening
C. learning
D. forwarding
E. discarding

Correct Answer: AB
Section: part 1
Explanation

Explanation/Reference:
STP定义了5种不同的端口状态,关闭(disable),监听(Listening),学习(Learning),阻断(Blocking)
和转发(Forwarding)
在RSTP中只有三种端口状态,Discarding、Learning和Forwarding

QUESTION 11
If a router has four interfaces and each interface is connected to four switches, how
many broadcast domains are present on the router?

A. 1
B. 2
C. 4
D. 8

Correct Answer: C
Section: part 1
Explanation

Explanation/Reference:

QUESTION 12
Which command enables IPv6 forwarding on a cisco router?

A. ipv6 host
B. ipv6 unicast-routing
C. ipv6 local
D. ipv6 neighbor

Correct Answer: B
Section: part 1
Explanation

Explanation/Reference:
在路由器上激活IPV6的命令

QUESTION 13
Refer to the exhibit. What is the most appropriate summarization for these routes?
A. 10.0.0.0 /21
B. 10.0.0.0 /22
C. 10.0.0.0 /23
D. 10.0.0.0 /24

Correct Answer: B
Section: part 1
Explanation

Explanation/Reference:
考点分析:这道题考的是子网的聚合。
10.0. 00000000 .0
10.0. 00000001 .0
10.0. 00000010 .0
10.0. 00000010 .0

十进制转成二进制, 发现这四个网段前22位都是一致的,故选项 为B。

QUESTION 14
Which set of commands is recommended to prevent the use of a hub in the access layer?

A. switch(config-if)#switchport mode trunk


switch(config-if)#switchport port-security maximum 1
B. switch(config-if)#switchport mode trunk
switch(config-if)#switchport port-security mac-address 1
C. switch(config-if)#switchport mode access
switch(config-if)#switchport port-security maximum 1
D. switch(config-if)#switchport mode access
switch(config-if)#switchport port-security mac-address 1

Correct Answer: C
Section: part 1
Explanation

Explanation/Reference:
防止集线器在接入层交换机上使用需要下列那个命令?
考点分析:这道题考的是端口安全,怎么限制集线器的使用,即是只允许在交换机的接口上连一个终端设
备。

QUESTION 15
A router has learned three possible routes that could be used to reach a destination network. One route is
from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782.
The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing
table?

A. the OSPF route


B. the EIGRP route
C. the RIPv2 route
D. all three routes
E. the OSPF and RIPv2 routes

Correct Answer: B
Section: part 1
Explanation

Explanation/Reference:
考点:考查路由条目进入路由表的原则:最优路由才能进入。去往同一目的的多条路由,先比较AD值,AD
值小者优先;AD值一直则比较metric值。
AD值:
EIGRP 90
OSPF 110
RIP 120

QUESTION 16
Two routers named Atlanta and Brevard are connected via their serial interfaces as illustrated, but they are
unable to communicate. The Atlanta router is known to have the correct configuration.

Given the partial configurations, identify the fault on the Brevard router that is causing the lack of
connectivity.

A. incompatible IP address
B. insufficient bandwidth
C. incorrect subnet mask
D. incompatible encapsulation
E. link reliability too low
F. IPCP closed

Correct Answer: D
Section: part 1
Explanation

Explanation/Reference:
两个路由器端口封装不一致,一个是HDLC,一个是PPP

QUESTION 17
A network administrator needs to configure a serial link between the main office and a remote location.The
router at the remote office is a non-cisco router. How should the network administrator configure the serial
interface of the main office router to make the connection?

A. Main(config)#interface serial 0/0


Main(config-if)#ip address 172.16.1.1 255.255.255.252
Main(config-if)#no shut
B. Main(config)#interface serial 0/0
Main(config-if)#ip address 172.16.1.1 255.255.255.252
Main(config-if)#encapsulation ietf
Main(config-if)#no shut
C. Main(config)#interface serial 0/0
Main(config-if)#ip address 172.16.1.1 255.255.255.252
Main(config-if)#encapsulation frame-relay
Main(config-if)#authenication chap
Main(config-if)#no shut
D. Main(config)#interface serial 0/0
Main(config-if)#ip address 172.16.1.1 255.255.255.252
Main(config-if)#encapsulation ppp
Main(config-if)#no shut

Correct Answer: D
Section: part 1
Explanation

Explanation/Reference:
remote office 使用非思科路由器,则main office 是思科路由器。

HDLC是Cisco路由器在同步串行线路上的默认封装方式。每个厂商的HDLC都是专用的。

PPP 用于异步串行(拨号)或同步串行(isdn)介质。PPP的基本目标是在数据链路层点到点链路上传输第
3层包。它不是一个专用协议,这就意味着如果你的路由器并不都是Cisco的,可以在串行接口上配置PPP封
装。串行接口两端的路由器都配置PPP才能工作。

帧中继有两种封装类型----Cisco和IETF.除非手动输入IETF,否则默认封装是Cisco。如果用帧中继连接一条
Cisco设备和一条非Cisco设备,要选择IETF封装类型。命令格式如下
Router(config)#int s0/0/0
Router(config-if)#encapsulation ?
frame-relay Frame Relay networks
hdlc Serial HDLC synchronous
ppp Point-to-Point protocol
Router(config-if)#encapsulation frame-relay ?
ietf Use RFC1490/RFC2427 encapsulation
<cr>
由此判断选项B 和C,命令格式不正确。

如果当一台思科路由器和一台非思科路由器通过串行连接在一起时,必须配置PPP或另外一种封装方法,像
帧中继,因为默认的HDLC不能工作。
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 18
Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuis and has built-in
security mechanisms?

A. Frame Relay
B. HDLC
C. x.25
D. PPP

Correct Answer: D
Section: part 1
Explanation

Explanation/Reference:
哪一个二层协议封装支持同步和异步电路并内嵌安全机制?
答案:PPP

QUESTION 19
Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be
the most effective steps to troubleshoot this physical layer problem? (Choose three.)
A. Ensure that the Ethernet encapsulations match on the interconnected router and switch ports.
B. Ensure that cables A and B are straight-through cables.
C. Ensure cable A is plugged into a trunk port.
D. Ensure the switch has power.
E. Reboot all of the devices.
F. Reseat all cables.

Correct Answer: BDF


Section: part 1
Explanation

Explanation/Reference:
考点:考查交换机端口颜色的定义。绿色正常,橘黄色有故障。
A:确认以太网封装是否匹配,错误。封装错误不会在端口LED显示
B:确认线缆A/B是否为直通线,正确。异构设备使用直通线
C:确认线缆A是否插到trunk口,错误。
D:确认是否通电,正确。
E:重启设备,错误。
F:重置所有电缆,正确。

QUESTION 20
A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The routers
cannot establish an adjacency relationship on their common Ethernet link. The graphic shows the output of
the show ip ospf interface e0 command for routers R1 and R2. Based on the information in the graphic,
what is the cause of this problem?
A. The OSPF area is not configured properly.
B. The priority on R1 should be set higher.
C. The cost on R1 should be set higher.
D. The hello and dead timers are not configured properly.
E. A backup designated router needs to be added to the network.
F. The OSPF process ID numbers must match.

Correct Answer: D
Section: part 1
Explanation

Explanation/Reference:

QUESTION 21
What will happen if a private IP address is assigned to a public interface connected to an ISP?

A. Addresses in a private range will be not routed on the Internet backbone.


B. Only the ISP router will have the capability to access the public network.
C. The NAT process will be used to translate this address in a valid IP address.
D. Several automated methods will be necessary on the private network.
E. A conflict of IP addresses happens, because other public routers can use the same range.

Correct Answer: A
Section: part 1
Explanation

Explanation/Reference:
私有地址被分配到连接到ISP的公网端口上,将会发生什么?
内部网络使用了私有地址,如果不使用nat的话我们是没办法访问外部网络的。因为公共网络不会给私有地
址路由

QUESTION 22
Refer to the exhibit. The Bigtime router is unable to authenticate to the Littletime router. What is the cause
of the problem?

A. The usernames are incorrectly configured on the two routers.


B. The passwords do not match on the two routers.
C. CHAP authentication cannot be used on a serial interface.
D. The routers cannot be connected from interface S0/0 to interface S0/0.
E. With CHAP authentication, one router must authenticate to another router. The routers cannot be
configured to authenticate to each other.

Correct Answer: B
Section: part 1
Explanation

Explanation/Reference:
ppp在进行认证配置的时候.用户名要是对端的用户名.但是password要是两边共享的password!

QUESTION 23
What will be the result if the following configuration commands are implemented on a Cisco
switch?
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security mac-address sticky

A. A dynamically learned MAC address is saved in the startup-configuration file.


B. A dynamically learned MAC address is saved in the running-configuration file.
C. A dynamically learned MAC address is saved in the VLAN database.
D. Statically configured MAC addresses are saved in the startup-configuration file if frames from that
address are received.
E. Statically configured MAC addresses are saved in the running-configuration file if frames from that
address are received.

Correct Answer: B
Section: part 1
Explanation

Explanation/Reference:
考点:考查交换机端口安全。sticky 关键字使静态配置和动态学习的mac方式优势相结合
A:把动态学习的mac保存到startup-config文件中,错误
B:把动态学习的mac保存到running-config文件中,正确
C:把动态学习的mac保存到vlan数据库中。错误。
D:如果接收到数据帧中包含静态配置的MAC地址,它将被保存在startup-config文件,错误
E:如果接收到数据帧中包含静态配置的MAC地址,它将被保存在running-config文件,错误
静态配置的直接保存在running-config里了。
QUESTION 24
Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch.

2950Switch(config-if)# switchport port-security

2950Switch(config-if)# switchport port-security mac-address sticky

2950Switch(config-if)# switchport port-security maximum 1

The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when this frame

is received by 2950Switch? (Choose two.)

A. The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.
B. Only host A will be allowed to transmit frames on fa0/1.
C. This frame will be discarded when it is received by 2950Switch.
D. All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwarded out fa0/1.
E. Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be
forwarded out fa0/1.
F. Only frames from source 0000.00bb.bbbb, the first learned MAC address of 2950Switch, will be
forwarded out fa0/1.

Correct Answer: BD
Section: part 1
Explanation

Explanation/Reference:
考点:考查交换机端口安全。maximum 1说明只允许一个mac通过。
A:添加ffff.ffff.ffff到mac地址表,错误。这是个arp报文,把数据包源mac添加到mac表
B:仅允许主机A通过f0/1,正确
C:当2950switch收到帧后丢弃,错误。应该是除f0/1外所有端口洪泛
D:当2950switch收到目的为0000.00aa.aaaa的数据帧会从f0/1转发,正确。
E:主机B和C的数据帧会从f0/1转发,但从其他交换接收到的不会,错误。
F:仅有源mac为0000.00bb.bbbb,2950switch第一个学习到的mac地址才有从f0/1转发。错误。
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 25
which command can you enter to re-enable Cisco Discovery Protocol on a local router
after it has been disabled?

A. Router(config-if)#cdp run
B. Router(config-if)#cdp enable
C. Router(config)#cdp run
D. Router(config)#cdp enable

Correct Answer: C
Section: part 1
Explanation

Explanation/Reference:
那一条命令在全局配置模式下能查看直连的cisco设备?
考点分析:这道题考的是CDP协议。CDP协议在路由器全局启用的命令是cdp run,答案是C。

QUESTION 26
A cisco router is booting and has just completed the POST process.It is now ready to find and load an
IOSimage.what function does the router perform next?

A. It checks the configuration register


B. It attempts to boot from a TFTP server
C. It loads the first image file in flash memory
D. It inspects the configuration file in NVRAM for boot instructions

Correct Answer: A
Section: part 1
Explanation

Explanation/Reference:
下一步检查configuration register 然后决定加载配置

QUESTION 27
What are three advantages of VLANs? (Choose three.)

A. They establish broadcast domains in switched networks.


B. They utilize packet filtering to enhance network security.
C. They provide a method of conserving IP addresses in large networks.
D. They provide a low-latency internetworking alternative to routed networks.
E. They allow access to network services based on department, not physical location.
F. They can simplify adding, moving, or changing hosts on the network.

Correct Answer: AEF


Section: part 1
Explanation

Explanation/Reference:
A:VLAN在交换网络中建立广播域,正确
B:利用VLAN的数据包过滤,增强网络的安全性。错误,没有这个特性。
C:提供了在大型网络中的保护IP地址的方法。错误。
D:提供低延迟互联网络替代路由网络。错误
E:vlan允许基于逻辑划分的网络访问,不是物理位置。正确。
F:VLAN可以大大简化添加,移动或更改网络上的主机。正确。
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 28
Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are
true? (Choose three.)
A. All ports will be in a state of discarding, learning, or forwarding.
B. Thirty VLANs have been configured on this switch.
C. The bridge priority is lower than the default value for spanning tree.
D. All interfaces that are shown are on shared media.
E. All designated ports are in a forwarding state.
F. The switch must be the root bridge for all VLANs on this switch.

Correct Answer: ACE


Section: part 1
Explanation

Explanation/Reference:
rstp的所有接口在收敛完成之前都将经历discarding->learning->forwarding的状态,并且rstp的默认优先级应该
为32768,所有的DP都将转发数据

QUESTION 29
Which two commands can be used to verify a trunk link configurationt status on a given cisco switch?
(choose two)

A. show interfaces interface


B. show interfaces trunk
C. show interfaces switchport
D. show ip interface brief
E. show interfaces vlan

Correct Answer: BC
Section: part 1
Explanation

Explanation/Reference:
查看trunk命令,show interface trunk和show interface switchport ,只能选BC
QUESTION 30
Which two states are the port states when RSTP has converged?(choose two)

A. blocking
B. learning
C. discarding
D. forwarding
E. listening

Correct Answer: CD
Section: part 1
Explanation

Explanation/Reference:
在RSTP中只有三种端口状态,Discarding、Leaning和Forwarding,汇聚之后的状态只有Discarding、
Forwarding。

QUESTION 31
Refer to the exhibit.A technician has installed SwithchB and needs to configure it for remote access from
the management workstation connected SwitchA Which set of commands is required to accomplish this
task?

A. SwitchB(config)#interface FastEthernet 0/1


SwitchB(config)#ip address 192.168.8.252 255.255.255.0
SwitchB(config)#no shutdown
B. SwitchB(config)#ip default-gateway 192.168.8.254
SwitchB(config)#interface vlan 1
SwitchB(config)#ip address 192.168.8.252 255.255.255.0
SwitchB(config)#no shutdown
C. SwitchB(config)#interface vlan 1
SwitchB(config)#ip address 192.168.8.252 255.255.255.0
SwitchB(config)#ip default-gateway 192.168.8.254 255.255.255.0
SwitchB(config)#no shutdown
D. SwitchB(config)#ip default-network 192.168.8.254
SwitchB(config)#interface vlan 1
SwitchB(config)#ip address 192.168.8.252 255.255.255.0
SwitchB(config)#no shutdown

Correct Answer: B
Section: part 1
Explanation

Explanation/Reference:
想要远程管理交换机需要在交换机上的配置,B正确

QUESTION 32
Which of the following are benefits of VLANs? (Choose three.)

A. They increase the size of collision domains.


B. They allow logical grouping of users by function.
C. They can enhance network security.
D. They increase the size of broadcast domains while decreasing the number of collision domains.
E. They increase the number of broadcast domains while decreasing the size of the broadcast domains.
F. They simplify switch administration.

Correct Answer: BCE


Section: part 1
Explanation

Explanation/Reference:
考查VLAN的特点
A:增加冲突域的大小,错误
B:允许逻辑划分网段,正确
C:增强网络安全,正确。不同vlan不能直接通信。
D:当减少冲突域时增加广播域的大小。错误
E:减少广播域的大小时增加了广播域个数。正确。
F:简化交换机管理。答非所问。
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 33
What are three benefits of implementing vlans?(choose three)

A. A more efficient use of bandwidth can be achieved allowing many physical groups to use the same
network infrastructure
B. Broadcast storms can be mitigated by decreasing the number of broadcast domains,thus increasing
their size.
C. A higher level of network security can be reached by separating sensitive data traffic from other network
traffic.
D. Port-based vlans increase switch-port use efficient,thanks to 802.1Q trunks
E. A more efficient use of bandwidth can be achieved allowing many logical networks to use the same
network infrastructure.
F. Broadcast storms can be mitigated by increasing the number of broadcast domains,thus reducing their
size.
G. VLANs make it easier for IT staff to configure new logical groups,because the vlans all belong to the
same broadcast domain.

Correct Answer: CEF


Section: part 1
Explanation

Explanation/Reference:
A错,不是通过物理上组合,而是逻辑上的
B错,应该是增加广播域的数量
C一个更高的层次网络安全可以实现,以分离的敏感数据从其他网络。正确
D thanks to 802.1Q trunks不正确
E正确 ,logical是逻辑的意思
F正确
G错误,描述的是VTP的作用而不是vlan的作用
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 34
Which three statements accurately describe layer 2 Ethernet switches?(choose three)

A. Microsegmentation decreases the number of collisions on the network.


B. if a switch receives a frame for an unkown destination,it uses ARP to resolve the address.
C. Spanning Tree Protocol allows switches to automatically share vlan information.
D. In a properly functioning network with redundant switched paths,each switched aegment will contain one
root bridge with all its ports in the forwarding state.All other switches in that broadcast domain will have
only one root port.
E. Establishing vlans increases the number of broadcast domains.
F. Switches that are configured with vlans make forwarding decisions based on both layer 2 and layer 3
address information.

Correct Answer: ADE


Section: part 1
Explanation

Explanation/Reference:
A为分割减少冲突的数量,这里是冲突并不是冲突域,正确
B收到未知目的帧会产生泛洪
C这是vtp的特性,不是stp的
D在一个能够正常运行的网络冗余交换路径,每一个交换网段将包括一个跟桥。所有端口都在转发状态,其
他本广播域的交换机有一个根端口。正确
E.VLAN增加了广播域。正确
F vlan使转发基于二层和三层IP。题目要求对2层交换机的描述,二层交换机不能基于3层IP转发

QUESTION 35
Which two correctly describe steps in the OSI data encapsulation process? (Choose two.)

A. The transport layer divides a data stream into segments and may add reliability and flow control
information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host
addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a
segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.

Correct Answer: AD
Section: part 1
Explanation

Explanation/Reference:
传输层将数据分段,并且加入flow control等信息。在网络层就将数据进行打包,并加上ip包头,链路层。将
包进行成Frame,封装二层头部
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 36
Which of the following describes the roles of devices in a WAN? (Choose three.)

A. A CSU/DSU terminates a digital local loop


B. A modem terminates a digital local loop
C. A CSU/DSU terminates an analog local loop
D. A modem terminates an analog local loop
E. A router is commonly considered a DTE device
F. A router is commonly considered a DCE device

Correct Answer: ADE


Section: part 1
Explanation

Explanation/Reference:
SU/DSU是用于连接终端和数字专线的设备,属于DCE设备
modem用于数字信号和模拟信号的转换,属于DCE设备
路由器一般是DTE设备
DTE和DCE的区别;
DCE是数据通信设备,如MODEM,连接DTE设备的通信设备。一般广域网常用的DCE设备有:CSU/DSU,
广域网交换机,MODEM。
DTE,DCE的之间的区别是DCE一方提供时钟,DTE不提供时钟,但它依靠DCE提供的时钟工作,比如PC机
和MODEM之间。数据传输通常是经过DTE-DCE,再经过DCE-DTE的路径。其实对于标准的串行端口,通
常从外观就能判断是DTE还是DCE,DTE是针头(俗称公头),DCE是孔头,(俗称母头),这样两种接口才
能接再一起。
ROUTER之间用串口的时候一般无所谓哪头是DCE,哪头是DTE。有的是默认规定好的,比如modem永远
是DCE,与其相连的电信程控交换机则为DCE,配的时候DCE不设置clock rate的话,无法通信。

QUESTION 37
Which interface counter can you use to diagnose a duplex mismatch problem?

A. no earner
B. late collisions
C. giants
D. CRC errors
E. deferred
F. runts

Correct Answer: B
Section: part 1
Explanation

Explanation/Reference:

QUESTION 38
Which feature can you implement to reserve bandwidth for VoIP calls across the call
path?

A. PQ
B. CBWFQ
C. round robin
D. RSVP

Correct Answer: D
Section: part 1
Explanation

Explanation/Reference:
When implemented on all nodes in the path, RSVP guarantees bandwidth for the call
along the entire path for the entire duration of the call. This is the only technique
that achieves this level of accuracy.
QUESTION 39
When an interface is configured with PortFast BPDU guard, how does the interface respond when it
receives a BPDU?

A. It continues operating normally.


B. It goes into a down/down state.
C. It becomes the root bridge for the configured VLAN.
D. It goes into an errdisable state.

Correct Answer: D
Section: part 1
Explanation

Explanation/Reference:

QUESTION 40
What are three characteristics of the TCP protocol? (Choose three.)

A. It uses a single SYN-ACK message to establish a connection.


B. The connection is established before data is transmitted.
C. It ensures that all data is transmitted and received by the remote device.
D. It supports significantly higher transmission speeds than UDP.
E. It requires applications to determine when data packets must be retransmitted.
F. It uses separate SYN and ACK messages to establish a connection.

Correct Answer: BCF


Section: part 1
Explanation

Explanation/Reference:

QUESTION 41
Which command can you enter to determine whether serial interface 0/2/0 has been configured using
HDLC encapsulation?

A. router#show platform
B. router#show interfaces Serial 0/2/0
C. router#show ip interface s0/2/0
D. router#show ip interface brief

Correct Answer: B
Section: part 1
Explanation

Explanation/Reference:

QUESTION 42
Which two statements about IPv4 multicast traffic are true? (Choose two.)

A. It burdens the source host without affecting remote hosts.


B. It uses a minimum amount of network bandwidth.
C. It is bandwidth-intensive.
D. It simultaneously delivers multiple streams of data.
E. It is the most efficient way to deliver data to multiple receivers.

Correct Answer: BE
Section: part 1
Explanation

Explanation/Reference:

QUESTION 43
What are two benefits of private IPv4 IP addresses? (Choose two.)

A. They are routed the same as public IP addresses.


B. They are less costly than public IP addresses.
C. They can be assigned to devices without Internet connections.
D. They eliminate the necessity for NAT policies.
E. They eliminate duplicate IP conflicts.

Correct Answer: BC
Section: part 1
Explanation

Explanation/Reference:
-----------鸿鹄论坛:http://bbs.hh010.com/

QUESTION 44
What is the authoritative source for an address lookup?

A. a recursive DNS search


B. the operating system cache
C. the ISP local cache
D. the browser cache

Correct Answer: A
Section: part 1
Explanation

Explanation/Reference:

QUESTION 45
Which command can you enter to verify that a BGP connection to a remote device is established?

A. show ip bgp summary


B. show ip community-list
C. show ip bgp paths
D. show ip route
Correct Answer: A
Section: part 1
Explanation

Explanation/Reference:

QUESTION 46
During which phase of PPPoE is PPP authentication performed?

A. the PPP Session phase


B. Phase 2
C. the Active Discovery phase
D. the Authentication phase
E. Phase 1

Correct Answer: A
Section: part 1
Explanation

Explanation/Reference:

QUESTION 47
Which three circumstances can cause a GRE tunnel to be in an up/down state? (Choose three.)

A. The tunnel interface IP address is misconfigured.


B. The tunnel interface is down.
C. A valid route to the destination address is missing from the routing table.
D. The tunnel address is routed through the tunnel itself.
E. The ISP is blocking the traffic.
F. An ACL is blocking the outbound traffic.

Correct Answer: BCD


Section: part 1
Explanation

Explanation/Reference:
-----------鸿鹄论坛:http://bbs.hh010.com/

QUESTION 48
Which two statements about using leased lines for your WAN infrastructure are true? (Choose two.)

A. Leased lines provide inexpensive WAN access.


B. Leased lines with sufficient bandwidth can avoid latency between endpoints.
C. Leased lines require little installation and maintenance expertise.
D. Leased lines provide highly flexible bandwidth scaling.
E. Multiple leased lines can share a router interface.
F. Leased lines support up to T1 link speeds.

Correct Answer: BC
Section: part 1
Explanation

Explanation/Reference:
The advantages of leased lines include:
+ Simplicity: Point-to-point communication links require minimal expertise to install and maintain.
+ Quality: Point-to-point communication links usually offer high service quality, if they have adequate
bandwidth. The dedicated capacity removes latency or jitter between the endpoints.
+ Availability: Constant availability is essential for some applications, such as e-commerce. Point-to-point
communication links provide permanent, dedicated capacity, which is required for VoIP or Video over IP.
The disadvantages of leased lines include:
+ Cost: Point-to-point links are generally the most expensive type of WAN access. The cost of leased line
solutions can become significant when they are used to connect many sites over increasing distances. In
addition, each endpoint requires an interface on the router, which increases equipment costs.
+ Limited flexibility: WAN traffic is often variable, and leased lines have a fixed capacity, so that the
bandwidth of the line seldom matches the need exactly (therefore answer D is not correct). Any change to
the leased line generally requires a site visit by ISP personnel to adjust capacity.
(Reference: Connecting Networks Companion Guide Book published by Cisco Networking Academy –
Page 54)

QUESTION 49
Which two statements about wireless LAN controllers are true? (Choose two.)

A. They can simplify the management and deployment of wireless LANs.


B. They rely on external firewalls for WLAN security.
C. They are best suited to smaller wireless networks.
D. They must be configured through a GUI over HTTP or HTTPS.
E. They can manage mobility policies at a systemwide level.

Correct Answer: AE
Section: part 1
Explanation

Explanation/Reference:

QUESTION 50
Which two statements about northbound and southbound APIs are true? (Choose two.)

A. Only southbound APIs allow program control of the network.


B. Only northbound APIs allow program control of the network.
C. Only southbound API interfaces use a Service Abstraction Layer.
D. Only northbound API interfaces use a Service Abstraction Layer.
E. Both northbound and southbound API interfaces use a Service Abstraction Layer.
F. Both northbound and southbound APIs allow program control of the network.

Correct Answer: BC
Section: part 1
Explanation

Explanation/Reference:

QUESTION 51
Which statement about RADIUS security is true?

A. It supports EAP authentication for connecting to wireless networks.


B. It provides encrypted multiprotocol support.
C. Device-administration packets are encrypted in their entirety.
D. It ensures that user activity is fully anonymous.

Correct Answer: A
Section: part 2
Explanation

Explanation/Reference:
-----------鸿鹄论坛:http://bbs.hh010.com/

QUESTION 52
If you are configuring syslog messages specifying `logging trap warning', which log messages will the router
send?

A. 0-4
B. 0-5
C. 0-6
D. 0-2
E. 0-1

Correct Answer: A
Section: part 2
Explanation

Explanation/Reference:
0 emergencies System is unusable
1 alerts Immediate action is needed
2 critical Critical conditions exist
3 errors Error conditions exist
4 warnings Warning conditions exist
5 notification Normal, but significant, conditions exist
6 informational Informational messages
7 debugging Debugging messages

QUESTION 53
Which command can you enter to configure an IPV6 floating static route?

A. Router(config)# ipv6 route FE80:0202::/32 serail 0/1 201


B. Router(config)# ipv6 route::/0 serail0/1
C. Router(config)# ipv6 route static resolve default
D. Router(config)# ipv6 route FE80:0202::/32 serail 0/1 1

Correct Answer: A
Section: part 2
Explanation

Explanation/Reference:

QUESTION 54
Which two statements about Ethernet standards are true?(choose two)

A. Ethernet is defined by IEEE standard 802.2


B. Ethernet is defined by IEEE standard 802.3
C. Ethernet 10BASE-T dose not support full-duplex.
D. When an Ethernet network uses CSMA/CD ,it terminates transmission as soon as
collision occurs
E. When an Ethernet network uses CSMA/CA ,it terminates transmission as soon as
collision occurs
Correct Answer: BD
Section: part 2
Explanation

Explanation/Reference:
http://www.ieee802.org/3/
CSMA/CD - It uses a carrier sensing scheme in which a transmitting station detects collisions by sensing
transmissions from other stations while transmitting a frame. When this collision condition is detected, the
station stops transmitting that frame.

QUESTION 55
Which function does IP SLA ICMP ECHO operation perform to assist with
troubleshooting ?

A. packet-loss detection
B. congestion detection
C. hop-by-hop response time
D. one way jitter measurement
E. http://bbs.hh010.com/

Correct Answer: C
Section: part 2
Explanation

Explanation/Reference:
IP SLA generates ICMP traffic and measures Round Trip Delay for entire path
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15-mt-book/
sla_icmp_echo.html

QUESTION 56
What are types of IPv6 static routes? (Choose Three.)

A. Recursive Static routes


B. Directly connected static routes
C. Fully specified static routes
D. Dynamically specified static routes
E. injected static routes
F. Redistributed static routes

Correct Answer: ABC


Section: part 2
Explanation

Explanation/Reference:

QUESTION 57
How to configure RIPv2? (Choose Two.)

A. Enable RIP
B. Connect RIP to WAN interface
C. Enable no auto-summary
D. Enable authentication
E. http://bbs.hh010.com/
Correct Answer: AC
Section: part 2
Explanation

Explanation/Reference:

QUESTION 58
What is the status of port-channel if LACP is misconfigured?

A. Forwarding
B. Enabled
C. Disabled
D. errdisabled

Correct Answer: C
Section: part 2
Explanation

Explanation/Reference:

QUESTION 59
What is true about DTP? (Choose Three.)

A. Layer 2 protocol
B. Layer 3 protocol
C. Proprietary protocol
D. enabled by default
E. disabled by default

Correct Answer: ACD


Section: part 2
Explanation

Explanation/Reference:

QUESTION 60
How to create a trunk port and allow VLAN 20? (Choose Three.)

A. switchport trunk encapsulation dot1q


B. switchport mode trunk
C. switchport trunk allowed vlan 20
D. switchport trunk native vlan 20
E. http://bbs.hh010.com/

Correct Answer: ABC


Section: part 2
Explanation

Explanation/Reference:
QUESTION 61
What 8-bit field exists in IP packet for QoS?

A. Tos Field
B. DSCP
C. IP Precedence
D. Cos
E. 鸿鹄论坛

Correct Answer: A
Section: part 2
Explanation

Explanation/Reference:

QUESTION 62
What feature uses a random time to re-sent a frame?

A. CSMA/CA
B. http://bbs.hh010.com/
C. http://bbs.hh010.com/
D. CSMA/CD

Correct Answer: D
Section: part 2
Explanation

Explanation/Reference:

QUESTION 63
Which mode is compatible with Trunk, Access, and desirable ports?

A. Trunk Ports
B. Access Ports
C. Dynamic Auto
D. Dynamic Desirable

Correct Answer: C
Section: part 2
Explanation

Explanation/Reference:

QUESTION 64
If you configure syslog messages without specifying the logging trap level, which log messages will the
router send?

A. 0-4
B. 0-5
C. 0-6
D. 0-2
E. 0-1

Correct Answer: C
Section: part 2
Explanation

Explanation/Reference:

QUESTION 65
Which command can you execute to set the user inactivity timer to 10 seconds?

A. SW1(config-line)#exec-timeout 0 10
B. SW1(config-line)#exec-timeout 10
C. SW1(config-line)#absolute-timeout 0 10
D. SW1(config-line)#absolute-timeout 10

Correct Answer: A
Section: part 2
Explanation

Explanation/Reference:

QUESTION 66
Which standards-based First Hop Redundancy Protocol is a Cisco supported alternative
to Hot Standby Router Protocol?

A. VRRP
B. GLBP
C. TFTP
D. DHCP

Correct Answer: A
Section: part 2
Explanation

Explanation/Reference:

QUESTION 67
Two hosts are attached to a switch with the default configuration. Which statement about the configuration
is true?

A. IP routing must be enabled to allow the two hosts to communicate.


B. The two hosts are in the same broadcast domain.
C. The switch must be configured with a VLAN to allow the two hosts to communicate.
D. Port security prevents the hosts from connecting to the switch.

Correct Answer: B
Section: part 2
Explanation

Explanation/Reference:

QUESTION 68
If a router has 3 hosts connected in one port and two other hosts connected in another port, how may
broadcast domains are present on the router?

A. 5
B. 2
C. 3
D. 4

Correct Answer: B
Section: part 2
Explanation

Explanation/Reference:

QUESTION 69
What are three parts of an IPv6 global unicast address? (Choose three.)

A. an interface ID that is used to identify the local host on the network


B. an interface ID that is used to identify the local network for a particular host.
C. a subnet ID that is used to identify networks inside of the local enterprise site
D. a global routing prefix that is used to identify the network portion of the address that has been provided
by an ISP
E. a global routing prefix that is used to identify the portion of the network address provided by a local
administrator

Correct Answer: ACD


Section: part 2
Explanation

Explanation/Reference:

QUESTION 70
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same
network while providing the max number of subnets.Which network address and subnet mask meet
this requirement?

A. 192.168.252.8 255.255.255.248
B. 192.168.252.8 255.255.255.252
C. 192.168.252.16 255.255.255.240
D. 192.168.252.0 255.255.255.252
E. 192.168.252.16 255.255.255.252

Correct Answer: A
Section: part 2
Explanation
Explanation/Reference:
需要3个有效地址,块大小最小为8,还要提供最大数量的子网,所以用最块大小8,掩码255.255.255.248

QUESTION 71
What parameter can be different on ports within an EtherChannel?

A. speed
B. DTP negotiation settings
C. trunk encapsulation
D. duplex

Correct Answer: B
Section: part 2
Explanation

Explanation/Reference:
在EtherChannel中,端口上那一项参数可以配置不一样?

QUESTION 72
Which two statements about IPv6 router advertisement messages are true? (Choose
two.)

A. They use ICMPv6 type 134.


B. The advertised prefix length must be 64 bits.
C. The advertised prefix length must be 48 bits.
D. They are sourced from the configured IPv6 interface address.
E. Their destination is always the link-local address of the neighboring node.

Correct Answer: AB
Section: part 2
Explanation

Explanation/Reference:

QUESTION 73
Which spanning-tree protocol rides on top of another spanning-tree protocol?

A. MSTP
B. RSTP
C. PVST+
D. Mono Spanning Tree

Correct Answer: A
Section: part 2
Explanation

Explanation/Reference:

QUESTION 74
A network administrator needs to configure port security on a switch.which two statements are true?(choose
two)
A. The network administrator can apply port security to dynamic access ports
B. The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
C. The sticky learning feature allows the addition of dynamically learned addresses to the running
configuration.
D. The network administrator can apply port security to EtherChannels.
E. When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up
to the maximum defined.

Correct Answer: CE
Section: part 2
Explanation

Explanation/Reference:
A.动态端口不能应用的端口安全
B.in the vioce vlan不正确
C.保存在running configuratin 正确
D.EtherChannels 不能应用端口安全
E自动学习mac地址可以学到所设置的最大数量,正确

QUESTION 75
Which switching method duplicates the first six bytes of a frame before making a
switching decision?

A. fragment-free switching
B. store and-forward switching
C. cut through switching
D. ASIC switching

Correct Answer: C
Section: part 2
Explanation

Explanation/Reference:
Cut and Through method has lowest latency. In this method Switch only read first six
bytes from frame after the preamble. These six bytes are the destination address of
frame. This is the fastest method of switching. This method also processes invalid
frames. Only advantage of this method is speed.
QUESTION 76
Which logging command can enable administrators to correlate syslog messages with
millisecond precision?

A. no logging console
B. logging buffered 4
C. no logging monitor
D. service timestamps log datetime msec
E. logging host 10.2.0.21

Correct Answer: D
Section: part 2
Explanation

Explanation/Reference:
QUESTION 77
Which three statements about link-state routing are true? (Choose three.)

A. Routes are updated when a change in topology occurs.


B. Updates are sent to a multicast address by default.
C. OSPF is a link-state protocol.
D. Updates are sent to a broadcast address.
E. RIP is a link-state protocol
F. It uses split horizon.

Correct Answer: ABC


Section: part 2
Explanation

Explanation/Reference:

QUESTION 78
Which command can you enter to determine whether a switch is operating in trunking
mode?

A. show ip interface brief


B. show vlan
C. show interfaces
D. show interface switchport

Correct Answer: D
Section: part 2
Explanation

Explanation/Reference:

QUESTION 79
Which command can you enter to view the ports that are assigned to VLAN 20?

A. Switch#show vlan id 20
B. Switch#show ip interface brief
C. Switch#show interface vlan 20
D. Switch#show ip interface vlan 20

Correct Answer: A
Section: part 2
Explanation

Explanation/Reference:

QUESTION 80
In which two formats can the IPv6 address fd15:0db8:0000:0000:0700:0003:400F:572B be written?
(Choose two.)

A. fd15:0db8:0000:0000:700:3:400F:572B
B. fd15::db8::700:3:400F:572B
C. fd15:db8:0::700:3:4F:572B
D. fd15:0db8::7:3:4F:572B
E. fd15:db8::700:3:400F:572B

Correct Answer: AE
Section: part 2
Explanation

Explanation/Reference:
-----------鸿鹄论坛:http://bbs.hh010.com/

QUESTION 81
Which function of the IP SLAs ICMP jitter operation can you use to determine whether a VoIP issue is
caused by excessive end-to-end time?

A. packet loss
B. jitter
C. successive packet loss
D. round-trip time latency

Correct Answer: D
Section: part 2
Explanation

Explanation/Reference:

QUESTION 82
Refer to the exhibit. Which of these statements correctly describes the state of the switch once the boot
process has been completed?
A. As FastEthernet0/12 will be the last to come up, it will not be blocked by STP.
B. Remote access management of this switch will not be possible without configuration change.
C. More VLANs will need to be created for this switch.
D. The switch will need a different IOS code in order to support VLANs and STP.

Correct Answer: B
Section: part 2
Explanation

Explanation/Reference:
vlan 1关闭的是int vlan 1这个虚拟端口,关闭的并不是vlan 1,这个vlan也是无法关闭的。

QUESTION 83
Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from
host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to
the other two hosts are successful.what is the issue?
A. Host B and the switch need to be in the same subnet.
B. The switch needs and appropriate default gateway assigned.
C. The switch interface connected to the router is down.
D. Host B need to be assigned an IP address in vlan 1.
E. The switch interfaces need the appropriate IP addresses assigned.

Correct Answer: B
Section: part 2
Explanation

Explanation/Reference:
远程管理交换机需要在交换机上设置default gateway和vlan IP

QUESTION 84
Which condition does the err-disabled status indicate on an Ethernet interface?

A. There is a duplex mismatch.


B. The device at the other end of the connection is powered off.
C. The serial interface is disabled.
D. The interface is configured with the shutdown command.
E. Port security has disabled the interface.
F. The interface is fully functioning.

Correct Answer: E
Section: part 2
Explanation

Explanation/Reference:
QUESTION 85
Refer to the exhibit. All of the routers in the network are configured with the ip subnet-zero command.
Which network addresses should be used for Link A and Network A? (Choose two.)

A. Network A - 172.16.3.48/26
B. Network A - 172.16.3.128/25
C. Network A - 172.16.3.192/26
D. Link A - 172.16.3.0/30
E. Link A - 172.16.3.40/30
F. Link A - 172.16.3.112/30

Correct Answer: BD
Section: part 2
Explanation

Explanation/Reference:
配置了ip subnet-zero,可以使用全0网段。
A:错误,120台主机,主机位至少为7位。
B:正确,主机位32-25=7
C:错误,主机位少于7位
D:正确。因为使用了ip subnet-zero。
E:错误,包含在172.16.3.32/27网段中
F:错误,包换在172.16.3.96/27网段中。

QUESTION 86
Which type of device can be replaced by the use of subinterfaces for VLAN routing?

A. Layer 2 bridge
B. Layer 2 switch
C. Layer 3 switch
D. router

Correct Answer: C
Section: part 2
Explanation

Explanation/Reference:
QUESTION 87
Which statement about LLDP is true?

A. It is a Cisco proprietary protocol


B. It is configured in global configuration mode.
C. The LLDP update frequency is a fixed value.
D. It runs over the transport layer.

Correct Answer: B
Section: part 2
Explanation

Explanation/Reference:

QUESTION 88
If all switches are configured with default values,which switch will take over when the
primary root bridge experiences a power loss?

A. switch 0040.0ВС0.90C5
B. switch 00E0.F90B.6BE3
C. switch 0004.9A1A.C182
D. switch 00E0.F726.3DC6

Correct Answer: C
Section: part 2
Explanation

Explanation/Reference:

QUESTION 89
A network administrator is troubleshooting an EIGRP problem on a router and needs to confirm the IP
addresses of the devices with which the router
has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need
to be checked. What command will display
the required information?

A. Router# show ip eigrp neighbors


B. Router# show ip eigrp interfaces
C. Router# show ip eigrp adjacency
D. Router# show ip eigrp topology

Correct Answer: A
Section: part 2
Explanation

Explanation/Reference:
QUESTION 90
Which three statements about IPv6 prefixes are true? (Choose three.)

A. FEC0::/10 is used for IPv6 broadcast.


B. FC00::/7 is used in private networks.
C. FE80::/8 is used for link-local unicast.
D. FE80::/10 is used for link-local unicast.
E. 2001::1/127 is used for loopback addresses.
F. FF00::/8 is used for IPv6 multicast.

Correct Answer: BDF


Section: part 2
Explanation

Explanation/Reference:

QUESTION 91
Which command can you enter to display duplicate IP addresses that the DHCP server assigns?

A. show ip dhcp conflict 10.0.2.12


B. show ip dhcp database 10.0.2.12
C. show ip dhcp server statistics
D. show ip dhcp binding 10.0.2.12

Correct Answer: A
Section: part 2
Explanation

Explanation/Reference:

QUESTION 92
Refer to the topology shown in the exhibit. Which ports will be STP designated ports if all the links are
operating at the same bandwidth? (Choose three.)

A. Switch A - Fa0/0
B. Switch A - Fa0/1
C. Switch B - Fa0/0
D. Switch B - Fa0/1
E. Switch C - Fa0/0
F. Switch C - Fa0/1

Correct Answer: BCD


Section: part 2
Explanation

Explanation/Reference:
B的mac最小为根桥 ,B的俩端口为指定端口. A的F0/0和C的F0/0为根端口。A的mac较小,A的F0/1为指定
端口,C的F0/1堵塞

QUESTION 93

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1
can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router
and switch2 are configured properly,which of the following commands should be issued on switch 1 to
correct this problem?

A. Switch1(config)# i nterface fa0 /1


Switch1(config-if)# ip address 192.168.24.3.255.255.255.0
B. Switch1 (config)# interface fa0/1
Switch1 (config-if)# switchport mode trunk
C. Switch 1 (config)# i nterface fa0 /1
Switch1 (config-if)# duplex full
Switch1 (config-if)# speed 100
D. Switch1 (config-if)# default-gateway 192.168.24.1
E. Switch1 (config)# line con 0
Switch1(config-line)# password cisco
Switch1 (config-line)#login

Correct Answer: D
Section: part 2
Explanation

Explanation/Reference:

QUESTION 94
Refer to the exhibit. Each of these four switches has been configured with a hostname, as well as being
configured to run RSTP. No other configuration changes have been made. Which three of these show the
correct RSTP port roles for the indicated switches and interfaces? (Choose three.)

A. SwitchA, Fa0/2, designated


B. SwitchA, Fa0/1, root
C. SwitchB, Gi0/2, root
D. SwitchB, Gi0/1, designated
E. SwitchC, Fa0/2, root
F. SwitchD, Gi0/2, root
Correct Answer: ABF
Section: part 2
Explanation

Explanation/Reference:
如图,每个交换机都配置了主机名,也都运行了RSTP,在就没有做其他的配置了。下面哪三个选项正确的
描述了RSTP的端口角色?
考点分析:
1.判断根桥,通过比较各个网桥的Mac地址,桥Mac地址最小的为根桥,所以根桥是C,根桥上的所有端口
是指定端口。
2.判断非根桥上的跟端口。在同一个交换机上,到根网桥的cost较小的那个端口会成为root port。所以
SwitchA Fa0/1,SwitchD Gi0/2,SwitchB Gi0/1会成为相应交换机上的RP。
3.判断每个网段上的指定端口。 SWA--SWB段:SWA的F0/2端口的cost为19,SWB的G0/2端口cost为4
+19=23,所以SWA的F0/2为指定端口。 SWB--SWD段:SWB的G0/1端口cost为19+19=38,SWD的G0/1
端口cost为19,所以SWD的G0/1端口为指定端口。
4.剩余SWB的G0/2端口既不是指定端口,又不是根端口,处于堵塞状态。
注:100M链路cost为19.1000M链路cost为4.

-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 95
Which feature builds a FIB and an adjacency table to expedite packet forwarding?

A. cut through
B. fast switching
C. process switching
D. Cisco Express Forwarding

Correct Answer: D
Section: part 2
Explanation

Explanation/Reference:

QUESTION 96
Which command can you enter to verify that a 128-bit address is live and responding?

A. traceroute
B. telnet
C. ping
D. show ipv6

Correct Answer: C
Section: part 2
Explanation

Explanation/Reference:

QUESTION 97
What are two reasons that duplex mismatches can be difficult to diagnose? (Choose two.)

A. The interface displays a connected (up/up) state even when the duplex settings are mismatched.
B. 1-Gbps interfaces are full-duplex by default.
C. Full-duplex interfaces use CSMA/CD logic, so mismatches may be disguised by collisions.
D. The symptoms of a duplex mismatch may be intermittent.
E. Autonegotiation is disabled.

Correct Answer: AD
Section: part 2
Explanation

Explanation/Reference:

QUESTION 98
Which condition indicates that service password-encryption is enabled?

A. The local username password is in clear text in the configuration.


B. The enable secret is in clear text in the configuration
C. The local username password is encrypted in the configuration.
D. The enable secret is encrypted in the configuration.

Correct Answer: C
Section: part 2
Explanation

Explanation/Reference:
-----------鸿鹄论坛:http://bbs.hh010.com/

QUESTION 99
Which protocol advertises a virtual IP address to facilitate transparent failover of a Cisco
routing device?

A. FHRP
B. DHCP
C. RSMLT
D. ESRP
Correct Answer: A
Section: part 2
Explanation

Explanation/Reference:

QUESTION 100
What is the correct routing match to reach 172.16.1.5/32?

A. 172.16.1.0/26
B. 172.16.1.0/25
C. 172.16.1.0/24
D. the default route

Correct Answer: A
Section: part 2
Explanation

Explanation/Reference:
当多条路由符合,选择最长掩码的路由

QUESTION 101
Which layer in the OSI reference model is responsible for determining the availability of the receiving
program and checking to see if enough resources exist for that communication?

A. transport
B. network
C. presentation
D. session
E. application

Correct Answer: E
Section: part 3
Explanation

Explanation/Reference:
OSI中那一层负责决定一个进程的可用性并查看是否有可用的资源分给该进程?
考点分析:OSI七层参考模型中负责决定一个进程的可用性并查看是否有可用的资源分给该进程是第七层应
用层

QUESTION 102
What is the purpose of the POST operation on a router?

A. determine whether additional hardware has been added


B. locate an IOS image for booting
C. enable a TFTP server
D. set the configuration register

Correct Answer: A
Section: part 3
Explanation
Explanation/Reference:

QUESTION 103
Which protocol is the Cisco proprietary implementation of FHRP?

A. HSRP
B. VRRP
C. GLBP
D. CARP

Correct Answer: A
Section: part 3
Explanation

Explanation/Reference:

QUESTION 104
Which characteristics are representative of a link-state routing protocol? (Choose two.)

A. provides common view of entire topology


B. exchanges routing tables with neighbors
C. calculates shortest path
D. utilizes event-triggered updates
E. utilizes frequent periodic updates

Correct Answer: AD
Section: part 3
Explanation

Explanation/Reference:
链路状态路由协议有协议特点?
A:提供查看拓扑的命令,正确。show ip ospf database
B:邻居之间交换路由信息,错误。交换LSA
C:计算最短路径。
D:利用触发更新,正确
E:利用周期更新,错误。

QUESTION 105
Which part of the PPPoE server configuration contains the information used to assign an IP address to a
PPPoE client?

A. virtual-template interface
B. DHCP
C. dialer interface
D. AAA authentication

Correct Answer: A
Section: part 3
Explanation

Explanation/Reference:
QUESTION 106
Which three statements about RSTP are true?(choose three)

A. RSTP significantly reduces topology reconverging time after a link failure.


B. RSTP expends the STP port roles by adding the alternate and backup roles.
C. RSTP port atates are blocking,discarding,learing,or forwarding.
D. RSTP also uses the STP proprsal-agreement sequence.
E. RSTP use the same timer-baseed process as STP on point-to-point links.
F. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.

Correct Answer: ABF


Section: part 3
Explanation

Explanation/Reference:
A能够减少汇聚时间
B比STP增加了端口角色alternat和backup
F在点到点链路提供比STP更快的传输和转发

QUESTION 107
What are two benefits of using NAT?(choose two)

A. NAT protects network security because private networks are not advertised.
B. NAT accelerates the routing process because no modifications are made on the packets.
C. Dynamic NAT facilitates connections from the outside of the network.
D. NAT facilitates end-to-end communication when IPsec is enable.
E. NAT eliminates the need to re-address all host that require extemal access.
F. NAT conserves addresses through host MAC-level multiplexing.

Correct Answer: AE
Section: part 3
Explanation

Explanation/Reference:
E.NAT 消除了当需要外部链接时每个主机都需要一个不同IP地址

QUESTION 108
Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12
on a switch?(choose two)

A. SW1#show swithport port-security interface FastEthernet 0/12


B. SW1# show swithport port-secure interface FastEthernet 0/12
C. SW1# show port-secure interface FastEthernet 0/12
D. SW1#show running-config
E. SW1#show port-security interface FastEthernet 0/12

Correct Answer: DE
Section: part 3
Explanation

Explanation/Reference:
查看端口安全的配置命令
QUESTION 109
Refer to the exhibit. Give this output for SwitchC, what should the network administrator's next action be?

A. Check the trunk encapsulation mode for SwitchC's fa0/1 port.


B. Check the duplex mode for SwitchC's fa0/1 port.
C. Check the duplex mode for SwitchA's fa0/2 port.
D. Check the trunk encapsulation mode for SwitchA's fa0/2 port.

Correct Answer: C
Section: part 3
Explanation

Explanation/Reference:
出现错误报文,可能是因为双工不匹配或者链路不稳定等因素造成的

QUESTION 110
Which statement is correct regarding the operation of DHCP?

A. A DHCP client uses a ping to detect address conflicts.


B. A DHCP server uses a gratuitous ARP to detect DHCP clients.
C. A DHCP client uses a gratuitous ARP to detect a DHCP server.
D. If an address conflict is detected, the address is removed from the pool and an administrator must
resolve the conflict.
E. If an address conflict is detected, the address removed from the pool for an amount of time configurable
by the administrator.
F. If an address conflict is detected, the address is removed from the pool and will not be reused until
server is rebooted.

Correct Answer: D
Section: part 3
Explanation

Explanation/Reference:
当两个主机用相同的IP地址时发生地址冲突,在这期间,DHCP检测到地址冲突,会把这个地址移出地址
池。这个地址将不再分配,直到管理员解决冲突。此题答案应该选:D
-----------鸿鹄论坛http://bbs.hh010.com/
QUESTION 111
Which two statements about using the CHAP authentication mechanism in a PPP link are true?(choose
two)

A. CHAP uses a two-way handshake


B. CHAP authentication periodically occurs after link establishment
C. CHAP has no protection from playback attacks
D. CHAP authentication is performed only upon link establishment
E. CHAP uses a three-way handshake
F. CHAP authentication passwords are sent in plaintext

Correct Answer: BE
Section: part 3
Explanation

Explanation/Reference:
PAP是两次握手机制;CHAP通过3次握手,CHAP定期发出挑战,以确保远程节点有有效的密码,CHAP采
用MD5加密算法,而PAP采用明文
A.CHAP认证采用的是两次握手机制
B.CHAP的认证是链路建立之后周期性发生的
C.CHAP认证没有重放攻击的保护
D.执行CHAP认证只是在链路建立的时候
E.CHAP认证采用的三次握手机制
F.CHAP认证的密码是采用明文的方式传输的
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 112
Refer to the exhibit. Switch port FastEthernet 0/24 on AlSwitch1 will be used to create an IEEE 802.1Q-
complaint trunk to another switch. Based on the output shown, What is the reason the trunk does not form,
even thought the proper cabling has been attached?

A. VLANs have not been created yet.


B. An IP address must be configured for the port.
C. The port is currently configured for access mode.
D. The correct encapsulation type has not been configured.
E. The no shutdown command has not been entered for the port.

Correct Answer: C
Section: part 3
Explanation

Explanation/Reference:
由图中知道接口配置为access模式。
A:vlan没有创建,错误
B:一个IP地址被配置在端口,错误。
C:端口当前处于access模式,正确。
D:没有配置正确的封装模式,错误。
E:接口没有no shutdown,错误。

QUESTION 113
Refer to the exhibit. A junior network administrator was given the task of configuring port security on
SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is
detected, the port is to drop frames from this device. The administrator configured the interface and tested it
with successful pings from PC_A to RouterA, and then observes the output from these two show
commands.
Which two of these changes are necessary for SwitchA to meet the requirements? (Choose two.)

A. Port security needs to be globally enabled.


B. Port security needs to be enabled on the interface.
C. Port security needs to be configured to shut down the interface in the event of a violation.
D. Port security needs to be configured to allow only one learned MAC address.
E. Port security interface counters need to be cleared before using the show command.
F. The port security configuration needs to be saved to NVRAM before it can become active.

Correct Answer: BD
Section: part 3
Explanation

Explanation/Reference:
题目大意是说在交换机A上端口f0/1上配置端口安全,目的是只允许 PC_A连接网络,其他设备连接上将被丢
弃,并且PCA可以ping通RA,问在swa上必须改变的哪两个配置?
考点分析:一般端口安全是在接口下配置的。如题,只允许PC_A连接交换机的Fa0/1口,所以应该限制接口
所允许的最大MAC地址数为1,即答案为BD。
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 114
Which three statements about static routing are true? (Choose three.)

A. It uses consistent route determination


B. It is best used for small-scale deployments.
C. Routing is disrupted when links fail.
D. It requires more resources than other routing methods.
E. It is best used for large-scale deployments.
F. Routers can use update messages to reroute when links fail.

Correct Answer: ABC


Section: part 3
Explanation

Explanation/Reference:

QUESTION 115
What are the address that will show at the show ip route if we configure the above statements? (Choose
Three.)

A. 10.0.0.0
B. 10.4.3.0
C. 172.15.4.0
D. 172.15.0.0
E. 192.168.4.0
F. 192.168.0.0

Correct Answer: ADE


Section: part 3
Explanation

Explanation/Reference:

QUESTION 116
Which feature facilitate the tagging of a specific VLAN?
A. Routing
B. Hairpinning
C. Encapsulation
D. Switching

Correct Answer: C
Section: part 3
Explanation

Explanation/Reference:

QUESTION 117
What does split horizon prevent?

A. routing loops, link state


B. routing loops, distance vector
C. switching loops, STP
D. switching loops, VTP

Correct Answer: B
Section: part 3
Explanation

Explanation/Reference:

QUESTION 118
Which value to use in HSRP protocol election process ?

A. interface
B. virtual IP address
C. priority
D. router ID

Correct Answer: C
Section: part 3
Explanation

Explanation/Reference:

QUESTION 119
which keyword enables an HSRP router to take the active role immediately when it
comes online?

A. preempt
B. priority
C. version
D. IP address

Correct Answer: A
Section: part 3
Explanation
Explanation/Reference:

QUESTION 120
Which command is used to show the interface status of a router?

A. show interface status


B. show ip interface brief
C. show ip route
D. show interface

Correct Answer: B
Section: part 3
Explanation

Explanation/Reference:

QUESTION 121
Which of the following privilege level is the most secured?

A. Level 0
B. Level 1
C. Level 15
D. Level 16

Correct Answer: C
Section: part 3
Explanation

Explanation/Reference:

QUESTION 122
Which IPV6 feature is supported in IPV4 but is not commonly used?

A. unicast
B. multicast
C. anycast
D. broadcast

Correct Answer: C
Section: part 3
Explanation

Explanation/Reference:

QUESTION 123
Which two statements are true about IPv6 Unique Local Addresses? (Choose Two.)

A. They are identical to IPv4 private addresses.


B. They use the prefix FC00::/7
C. They are defined by RFC 1884
D. They use the prefix FEC0::/10
E. They can be routed on the IPv6 global internet.

Correct Answer: AB
Section: part 3
Explanation

Explanation/Reference:

QUESTION 124
Which range represents the standard access list?

A. 99
B. 150
C. 299
D. 2000

Correct Answer: A
Section: part 3
Explanation

Explanation/Reference:

QUESTION 125
What to do when the router password was forgotten?

A. use default password cisco to reset


B. access router physically
C. use ssl/vpn
D. Type confreg 0x2142 at the rommon 1

Correct Answer: D
Section: part 3
Explanation

Explanation/Reference:

QUESTION 126
What is true about Cisco Discovery Protocol?

A. it discovers the routers, switches and gateways.


B. it is network layer protocol
C. it is physical and data link layer protocol
D. it is proprietary protocol

Correct Answer: D
Section: part 3
Explanation

Explanation/Reference:
QUESTION 127
Which of the following encrypts the traffic on a leased line?

A. telnet
B. ssh
C. vtp
D. vpn
E. dmvpn

Correct Answer: B
Section: part 3
Explanation

Explanation/Reference:

QUESTION 128
How do you configure a hostname?

A. Router(config)#hostname R1
B. http://bbs.hh010.com/
C. http://bbs.hh010.com/
D. http://bbs.hh010.com/

Correct Answer: A
Section: part 3
Explanation

Explanation/Reference:

QUESTION 129
Which technology supports multiple dynamic secure connections over an unsecure transport network?

A. Point-to-point
B. DMVPN
C. VPN
D. site-to-site VPN

Correct Answer: B
Section: part 3
Explanation

Explanation/Reference:

QUESTION 130
Refer to the exhibit.Switch-1 needs to send data to a host with a MAC address of 00b0.d056.efa4.What will
Switch-1 do with this data?
A. switch-1 will drop the data because it dose not have an entry for that MAC address
B. switch-1 will flood the data out all of its port from which the data originated
C. switch-1 will forward the data to its default gateway
D. switch-1 will send an ARP request out all its ports except the port from which the data originated

Correct Answer: B
Section: part 3
Explanation

Explanation/Reference:
答案:B 
交换机根据收到数据帧中的源MAC地址建立该地址同交换机端口的映射,并将其写 入MAC地址表中。交换
机将数据帧中的目的MAC地址同已建立的MAC地址表进行比较,以决定由哪个端口进行转发。如数据帧中
的目的MAC地址不在MAC地址表中,则发生泛洪。泛洪(flooding) 交换机和网桥使用的一种数据流传递
技术,将某个接口受到的数据流从除该核接口之外的所有接口发送出去。
根据下图,Switch-1需要往一台MAC地址为00b0.d056.efa4的主机发数据,Switch-1会如何处理这些数据?
A. Switch-1 will drop the data because it does not have an entry for that MAC address.(Switch-1会丢弃该数
据,因为它没有该MAC地址条目)
B. Switch-1 will flood the data out all of its ports except the port from which the data originated.(Switch-1会
泛洪该数据到所有的接口,除了该数据的源接口)
C. Switch-1 will send an ARP request out all its ports except the port from which the data originated.(Switch-
1会发送ARP请求到所有的接口,除了该数据的源接口)
D. Switch-1 will forward the data to its default gateway.(Switch-1会往默认网关发送该数据)

QUESTION 131
interface fa0/0
ip address x.x.x.33 255.255.255.224
router bgp XXX
neighbor x.x.x.x remote as x.x.x.x
You need to advertise the network of Int fa0/0.

A. x.x.x.32 mask 255.255.255.224


B. x.x.x.32 255.255.255.224
C. x.x.x.32 mask 0.0.0.31
D. x.x.x.33 mask 255.255.255.224

Correct Answer: A
Section: part 3
Explanation

Explanation/Reference:

QUESTION 132
which type of routing protocol operates by using first-hand information from each device’s peers?

A. link-state protocols
B. distance vector protocols
C. path vector protocols
D. http://bbs.hh010.com/

Correct Answer: A
Section: part 3
Explanation

Explanation/Reference:
exterior gateway protocols

QUESTION 133
Refer to the exhibit. You have discovered that computers on the 192 168 10 0/24 network can ping their
default gateway, but they cannot connect to any resources on a remote network. Which reason for the
problem is most likely true?

A. The 192.168.12 0/24 network is missing from OSPF.


B. The OSPF process ID is incorrect
C. The OSPF area number is incorrect.
D. An ARP table entry is missing for 192.168.10.0.
E. A VLAN number is incorrect for 192.168.10.0.

Correct Answer: A
Section: part 3
Explanation

Explanation/Reference:

QUESTION 134
What field is consist of 6 bytes in the field identification frame in IEEE 802.1Q?
A. SA
B. DA
C. FCS
D. http://bbs.hh010.com/

Correct Answer: A
Section: part 3
Explanation

Explanation/Reference:

QUESTION 135
What is new in HSRPv2?

A. prempt
B. a greater number in hsrp group field
C. http://bbs.hh010.com/
D. http://bbs.hh010.com/

Correct Answer: B
Section: part 3
Explanation

Explanation/Reference:

QUESTION 136
Which two statements about MPLS are true? (Choose two)

A. It provides automatic authentication


B. It can carry multiple protocols, including IPv4 and IPv6
C. It encapsulates all traffic in an IPv4 header
D. It uses labels to separate and foward customer traffic
E. It tags customer traffic using 802.1q

Correct Answer: BD
Section: part 3
Explanation

Explanation/Reference:

QUESTION 137
A network engineer wants to allow a temporary entry for a remote user with a specific usename and
password so that the user can access the entire network over the internet.which ACL can be used?

A. reflexive
B. extended
C. standard
D. dynamic

Correct Answer: D
Section: part 3
Explanation

Explanation/Reference:
网络工程师想要允许一个临时站与一个特定的usename远程用户和密码,这样用户可以访问整个网络.which
ACL可以使用?
动态ACL
We can use a dynamic access list to authenticate a remote user with a specific
username
and password. The authentication process is done by the router or a central access
server
such as a TACACS+ or RADIUS server.
QUESTION 138
Which command is necessary to permit SSH or Telnet access to a cisco switch that is
otherwise configured for these vty line protocols?

A. transport type all


B. transport output all
C. transport preferred all
D. transport input all

Correct Answer: D
Section: part 3
Explanation

Explanation/Reference:

QUESTION 139
What should be part of a comprehensive network security plan?

A. Allow users to develop their own approach to network security.


B. Physically secure network equipment from potential access by unauthorized
individuals
C. Encourage users to use personal information in their passwords to minimize the
likelihood of passwords being forgotten.
D. Delay deployment of software patches and updates until their effect on end-user
equipment is well known and widely reported
E. Minimize network overhead by deactivating automatic antivirus client updates.

Correct Answer: B
Section: part 3
Explanation

Explanation/Reference:

QUESTION 140
Which two Cisco IOS commands, used in troubleshooting, can enable debug output to a
remote location? (Choose two)

A. no logging console
B. logging host ip-address
C. terminal monitor
D. show logging | redirect flashioutput.txt
E. snmp-server enable traps syslog

Correct Answer: BC
Section: part 3
Explanation

Explanation/Reference:

QUESTION 141
Which component of the Cisco SDN solution serves as the centralized management system?

A. Cisco OpenDaylight
B. Cisco ACI
C. Cisco APIC
D. Cisco IWAN

Correct Answer: C
Section: part 3
Explanation

Explanation/Reference:

QUESTION 142
Which command is used to build DHCP pool?

A. ip dhcp pool DHCP


B. ip dhcp conflict
C. ip dhcp-server pool DHCP
D. ip dhcp-client pool DHCP

Correct Answer: A
Section: part 3
Explanation

Explanation/Reference:

QUESTION 143
Which utility can you use to determine whether a switch can send echo requests and replies?

A. ping
B. traceroute
C. ssh
D. telnet

Correct Answer: A
Section: part 3
Explanation

Explanation/Reference:

QUESTION 144
What is the two benefits of DHCP snooping? (Choose two.)

A. prevent static reservation


B. prevent reservation
C. prevent DHCP rogue server
D. track users hosts on the network.

Correct Answer: CD
Section: part 3
Explanation

Explanation/Reference:

QUESTION 145
What are the three major components of cisco network virtualization? (Choose Three.)

A. network access control


B. path isolation
C. virtual network services
D. policy enforcement

Correct Answer: ABC


Section: part 3
Explanation

Explanation/Reference:

QUESTION 146
Which feature is config by setting a variance that is at least 2 times the metric?

A. unequal cost load balancing


B. path selection
C. equal cost load balancing
D. path count

Correct Answer: A
Section: part 3
Explanation

Explanation/Reference:

QUESTION 147
Standard industrialized protocol of etherchannel?

A. LACP
B. PAGP
C. PRP
D. REP

Correct Answer: A
Section: part 3
Explanation
Explanation/Reference:

QUESTION 148
Which two options are features of the extended ping command? (Choose two.)

A. It can send a specific number of packet


B. It can send packet from specified interface of IP address
C. It can resolve the destination host name
D. It can ping multiple host at the same time
E. it can count the number of hops to the remote host.

Correct Answer: AB
Section: part 3
Explanation

Explanation/Reference:

QUESTION 149
What command is used to configure a switch as authoritative NTP server ?

A. switch(config)#ntp master 3
B. switch(config)#ntp peer 193.168.2.2
C. switch(config)#ntp server 193.168.2.2
D. switch(config)#ntp source 193.168.2.2

Correct Answer: A
Section: part 3
Explanation

Explanation/Reference:

QUESTION 150
Which two statements about syslog loging are true?(Choose two.)

A. Syslog logging is disabled by default


B. Messages are stored in the internal memory of device
C. Messages can be erased when device reboots
D. Messages are stored external to the device
E. The size of the log file is dependenet on the resources of the device

Correct Answer: BC
Section: part 3
Explanation

Explanation/Reference:

QUESTION 151
How to enable vlans automatically across multiple switches?

A. Configure VLAN
B. Confiture NTP
C. Configure each VLAN
D. Configure VTP

Correct Answer: D
Section: part 4
Explanation

Explanation/Reference:

QUESTION 152
Which password types are encrypted?

A. SSH
B. Telnet
C. enable secret
D. enable password

Correct Answer: C
Section: part 4
Explanation

Explanation/Reference:

QUESTION 153
Which option describes a benefit of a point-to-point leased line ?

A. Low cost
B. Full-mesh capability
C. Flexibillity of design
D. Simply of configuration

Correct Answer: D
Section: part 4
Explanation

Explanation/Reference:

QUESTION 154
What is the binary pattern of unique ipv6 unique local address?

A. 00000000
B. 11111100
C. 11111111
D. 11111101

Correct Answer: B
Section: part 4
Explanation

Explanation/Reference:

QUESTION 155
Which statemnet about ACLs is true?
A. An ACL have must at least one permit action, else it just blocks all traffic.
B. ACLs go bottom-up through the entries looking for a match
C. An ACL has a an implicit permit at the end of ACL.
D. ACLs will check the packet against all entries looking for a match.

Correct Answer: A
Section: part 4
Explanation

Explanation/Reference:

QUESTION 156
What is the cause of the Syslog output messages?

A. The EIGRP neighbor on Fa0/1 went down due to a failed link.


B. The EIGRP neighbor connected to Fa0/1 is participating in a different EIGRP process, causing the
adjacency to go down.
C. A shut command was executed on interface Fa0/1, causing the EIGRP adjacency to go down.
D. Interface Fa0/1 has become error disabled, causing the EIGRP adjacency to go down.

Correct Answer: C
Section: part 4
Explanation

Explanation/Reference:
-----------鸿鹄论坛:http://bbs.hh010.com/

QUESTION 157
What are contained in layer 2 ethernet frame? (Choose Three.)

A. Preamble
B. TTL
C. Type/length
D. Frame check sequence
E. version
F. http://bbs.hh010.com/

Correct Answer: ACD


Section: part 4
Explanation

Explanation/Reference:

QUESTION 158
Describe the best way to troubleshoot and isolate a network problem?

A. Create an action plan


B. Implement an action plan
C. Gather facts
D. Change on variable at a time
Correct Answer: C
Section: part 4
Explanation

Explanation/Reference:

QUESTION 159
Under normal operations, cisco recommends that you configure switch ports on which vlan?

A. on the default vlan


B. on the management vlan
C. on the native vlan
D. on any vlan except the default vlan

Correct Answer: D
Section: part 4
Explanation

Explanation/Reference:

QUESTION 160
Which DTP switch port mode allows the port to create a trunk link if the neighboring port is in trunk mode,
dynamic desirable mode, or desirable or auto mode?

A. Dynamic Auto
B. Dynamic Desirable
C. Access
D. Trunk

Correct Answer: B
Section: part 4
Explanation

Explanation/Reference:

QUESTION 161
In which byte of an IP packet can traffic be marked ?

A. the QoS byte


B. the CoS byte
C. the ToS byte
D. the DSCP byte

Correct Answer: C
Section: part 4
Explanation

Explanation/Reference:

QUESTION 162
Which command can you enter to route all traffic that is destined for 192.168.0.0/20 to a
specific interface?

A. router(config)#ip route 192.168.0.0 255.255.240.0 GigabitEthernet0/1


B. router(config)#ip route 0.0.0.0 255.255.255.0 GigabitEthernet0/1
C. router(config)#ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1
D. router(config)#ip route 192.168.0.0 255.255.255.0 GigabitEthernet0/1

Correct Answer: A
Section: part 4
Explanation

Explanation/Reference:

QUESTION 163
Which two protocol can detect native vlan mismatch errors? (Choose two.)

A. CDP
B. VTP
C. DTP
D. STP
E. PAGP

Correct Answer: AD
Section: part 4
Explanation

Explanation/Reference:

QUESTION 164
Which three options are switchport config that can always avoid duplex mismatch error between the
switches?
(Choose Three.)

A. set both side on auto-negotation


B. set both sides on half-duplex
C. set one side auto and other side half-duplex
D. set both side of connection to full-duplex
E. set one side auto and other side on full-duplex
F. set one side full-duplex and other side half-duplex

Correct Answer: ABD


Section: part 4
Explanation

Explanation/Reference:

QUESTION 165
What are two benefits of Private IPv4 Addresses? (Choose two.)

A. they can be implemented without requiring admin to coordinate with IANA


B. they are managed by IANA
C. increase the flexibility of network design
D. provide network isloation from the internet
E. they are routable over internet

Correct Answer: AD
Section: part 4
Explanation

Explanation/Reference:

QUESTION 166
How many bits represent network id in a IPv6 address?

A. 32
B. 48
C. 64
D. 128

Correct Answer: C
Section: part 4
Explanation

Explanation/Reference:

QUESTION 167
Which WAN topology is most appropriate for a centrally located server farm with several satellite branches?

A. star
B. hub and spoke
C. point-to-point
D. full mesh

Correct Answer: B
Section: part 4
Explanation

Explanation/Reference:

QUESTION 168
Which function allows EIGRP peers to receive notice of implementing topology changes?

A. successors
B. advertised changes
C. goodbye messages
D. expiration of the hold timer

Correct Answer: C
Section: part 4
Explanation

Explanation/Reference:
QUESTION 169
If you configure syslog messages without specifying the logging trap level, which log messages will the
router send?

A. informational messages only


B. warning and error conditions only
C. normal but significant conditions only
D. error conditions only
E. all levels except debugging

Correct Answer: E
Section: part 4
Explanation

Explanation/Reference:

QUESTION 170
Which three options are benefits of using TACACS+ on a device? (Choose three)

A. It ensures that user activity is untraceable


B. It provides a secure accounting facility on the device.
C. device-administration packets are encrypted in their entirely.
D. It allows the user to remotely access devices from other vendors.
E. It allows the users to be authenticated against a remote server.
F. It supports access-level authorization for commands.

Correct Answer: CEF


Section: part 4
Explanation

Explanation/Reference:

QUESTION 171
What layer of the OSI Model is included in TCP/IP Model's INTERNET layer?

A. Application
B. Session
C. Data Link
D. Presentation
E. Network

Correct Answer: E
Section: part 4
Explanation

Explanation/Reference:

QUESTION 172
Which two of these are characteristics of the 802.1Q protocol?(choose two)

A. it is a layer 2 messaging protocol which maintains vlan configurations across network.


B. it includes an 8-bit field which specifies the priority of a frame.
C. it is used exclusively for tagging vlan frames and dose not address network reconvergence following
switched network topology changes.
D. it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E. it is a trunking protocol capable of carring untagged frames.

Correct Answer: DE
Section: part 4
Explanation

Explanation/Reference:
A描述的是vtp的特性
B应该是3bit
Cexclusively是唯一的意思。802.1Q不是唯一的
D修改帧的头部,需要重新进行FCS校验,正确
E是一个trunk协议并支持不打标记的帧,正确

QUESTION 173
Which two features can dynamically assign IPv6 addresses? (Choose two.)

A. IPv6 stateless autoconfiguration


B. DHCP
C. NHRP
D. IPv6 stateful autoconfiguration
E. ISATAP tunneling

Correct Answer: AD
Section: part 4
Explanation

Explanation/Reference:

QUESTION 174
A security administrator wants to profile endpoints and gain visibility into attempted authentications. Which
802.1x mode allows these actions?

A. Monitor mode
B. High-Security mode
C. Low-impact mode
D. Closed mode

Correct Answer: A
Section: part 4
Explanation

Explanation/Reference:

QUESTION 175
How to verify SSH connections was secured?

A. ssh -v 1 -l admin IP
B. ssh -v 2 -l admin IP
C. ssh -l admin IP
D. http://bbs.hh010.com/

Correct Answer: B
Section: part 4
Explanation

Explanation/Reference:

QUESTION 176
How many usable host are there per subnet if you have the address of 192.168.10.0 with a subnet mask of
255.255.255.240?

A. 4
B. 8
C. 16
D. 14

Correct Answer: D
Section: part 4
Explanation

Explanation/Reference:

QUESTION 177
Which type of cable must you use to connect two device with MDI interfaces ?

A. cut-through
B. straight-through
C. crossover
D. rollover

Correct Answer: C
Section: part 4
Explanation

Explanation/Reference:

QUESTION 178
which command is used to know the duplex speed of serial link?

A. show line
B. show interface
C. show protocol
D. show run

Correct Answer: B
Section: part 4
Explanation

Explanation/Reference:

QUESTION 179
Which three statements about HSRP operation are true? (Choose three.)

A. The virtual IP address and virtual address are active on the HSRP Master router.
B. The HSRP default timers are a 3 second hello interval and a 10 second dead interval.
C. HSRP supports only clear-text authentication.
D. The HSRP virtual IP address must be on a different subnet than the routers' interfaces on the same
LAN.
E. The HSRP virtual IP address must be the same as one of the router's interface addresses on the LAN.
F. HSRP supports up to 255 groups per interface, enabling an administrative form of load balancing

Correct Answer: ABF


Section: part 4
Explanation

Explanation/Reference:

QUESTION 180
Which two options describe benefits of aggregated chassis technology? (Choose two.)

A. It requires only three IP addresses per VLAN.


B. It supports HSRP, VRRP, and GLBP.
C. It requires only one IP address per VLAN.
D. It reduces management overhead.
E. It supports redundant configuration files.
F. Switches can be located anywhere regardless of their physical distance from one anot
her.

Correct Answer: CD
Section: part 4
Explanation

Explanation/Reference:

QUESTION 181
When troubleshooting client DNS issues, which two task must you perform? (Choose two)

A. Ping a public website IP address.


B. Ping the DNS Server.
C. Determine whether a DHCP address has been assigned.
D. Determine whether the hardware address is correct.
E. Determine whether the name servers have been configured

Correct Answer: BE
Section: part 4
Explanation

Explanation/Reference:

QUESTION 182
Which utility can you use to identify the cause of a traffic-flow blockage between two
devices in a network?

A. The ACL path analysis tool in Cisco APIC-EM


B. The ACL trace tool in Cisco APIC-EM
C. The Cisco APIC-EM automation scheduler.
D. The Cisco IWAN application.

Correct Answer: A
Section: part 4
Explanation

Explanation/Reference:

QUESTION 183
which function does traffic shaping perform?

A. it bufers and queues excess packets


B. it drops packets to control the output rate
C. it buffers traffic without queuing it
D. it queues traffic without buffering it

Correct Answer: A
Section: part 4
Explanation

Explanation/Reference:

QUESTION 184
Which two statements about extended traceroute command are true?(choose two)

A. it can send packets from a specified interface or ip address


B. it can use a specified TTL value
C. it can validate the reply data
D. it can use a specificed TOS
E. it can repeated automatically to a specified interval

Correct Answer: AB
Section: part 4
Explanation

Explanation/Reference:

QUESTION 185
A BPDU guard is configured on an interface that has PortFast Enable. Which state
does the interface enter when it recives a BPDU ?

A. Blocking
B. Shutdown
C. Listening
D. Errdisable

Correct Answer: D
Section: part 4
Explanation

Explanation/Reference:

QUESTION 186
Which statement about SNMPv2 is true ?

A. Its privacy algorithms use MD5 encryption by default.


B. it requires passwords to be encrypyed
C. Its authetication and privacy algorithms are enable without default values.
D. It requires passwords at least eight characters en length.

Correct Answer: C
Section: part 4
Explanation

Explanation/Reference:

QUESTION 187
which type of IP address of ipv6 that also exist in IPv4 but barely used?

A. unicast
B. multicast
C. anycast
D. broadcast

Correct Answer: C
Section: part 4
Explanation

Explanation/Reference:

QUESTION 188
Which symptom most commonly indicates that two connecting interface are configured
with a duplex mismatch?

A. an interface with up/down state


B. an interface with down/down state
C. late collisions on the interface
D. the spanning tree process shutting down

Correct Answer: C
Section: part 4
Explanation

Explanation/Reference:
QUESTION 189
How Eigrp for ipv6 configuration done? ( choose two)

A. uses process number


B. neighbor configured directly
C. configured driectly on interface
D. configured globally interface
E. have shutdown feature

Correct Answer: CE
Section: part 4
Explanation

Explanation/Reference:

QUESTION 190
Which VTP mode prevents you from making changes to vlans?

A. Server
B. Client
C. Transparent
D. Off

Correct Answer: B
Section: part 4
Explanation

Explanation/Reference:

QUESTION 191
Which mode are in PAgP? (choose two)

A. Auto
B. Desirable
C. Active
D. Passive
E. On

Correct Answer: AB
Section: part 4
Explanation

Explanation/Reference:

QUESTION 192
In an Ethernet network, under what two scenarios can devices transmit? (Choose two.)

A. when they receive a special token


B. when there is a carrier
C. when they detect no other devices are sending
D. when the medium is idle
E. when the server grants access

Correct Answer: CD
Section: part 4
Explanation

Explanation/Reference:

QUESTION 193
Which two protocols are used by bridges and/or switches to prevent loops in a
layer 2 network? (Choose two.)

A. 802.1d
B. VTP
C. 802.1q
D. SAP
E. STP

Correct Answer: AE
Section: part 4
Explanation

Explanation/Reference:

QUESTION 194
At which layer of the OSI model dose PPP perform?

A. Layer 3
B. Layer 4
C. Layer 2
D. Layer 5

Correct Answer: C
Section: part 4
Explanation

Explanation/Reference:

QUESTION 195
Which are three reasons that an organization with multiple branch offices and roaming users might
implement a Cisco VPN solution instead of point-to-point WAN links?(choose three)

A. reduced cost
B. better throughput
C. increased security
D. scalability
E. reduced latency
F. broadband incompatibility

Correct Answer: ACD


Section: part 4
Explanation
Explanation/Reference:
答案:A C D. VPN英文全称是“Virtual Private Network”,翻译过来就是“虚拟专用网络”。vpn被定义为通过
一个公用网络(通常是因特网)建立一个临时的、安全的连接,是一条穿过混乱的公用网络的安全、稳定隧
道。
特点:
1.安全保障  
2.服务质量保证(QoS)
3.可扩充性和灵活性
4.可管理性
A 节约成本
C 增强安全性
D 易扩展
B提高吞吐量---感觉应该是P2P的优点
E减少潜在因素
F带宽 不是很有关系
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 196
Which IPv6 header field is equivalent to the TTL?

A. Hop Limit
B. Flow Label
C. TTD
D. Hop Count
E. Scan Timer

Correct Answer: A
Section: part 4
Explanation

Explanation/Reference:

QUESTION 197
which port security mode can assist with troubleshooting by keeping count of violations?

A. access
B. protect
C. restrict
D. shutdown

Correct Answer: C
Section: part 4
Explanation

Explanation/Reference:

QUESTION 198
Which two options are requirements for configuring RIPv2 on the IPv4 network router? (choose two)

A. enabling RIP authentication


B. connecting RIP to a WAN Interface
C. enabling auto route sumamrization
D. allowing unicast updates for RIP
E. enabling RIP on the router

Correct Answer: DE
Section: part 4
Explanation

Explanation/Reference:

QUESTION 199
which configuration command can you apply to a hsrp router so that its local interface becomes active if all
other routers in
the group fail?

A. no additional config is required


B. standby 1 track ethernet
C. standby 1 preempt
D. standby 1 priority 250

Correct Answer: A
Section: part 4
Explanation

Explanation/Reference:

QUESTION 200
which statement about EIGRP on IPv6 device is true?

A. It is configured directly on the interface


B. The configuration uses secondary IP address
C. The configuration uses process numbers
D. The neighbors of each device are directly configured

Correct Answer: A
Section: part 4
Explanation

Explanation/Reference:
http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/113267-
eigrp-ipv6-00.html

QUESTION 201
which command can you enter to troubleshoot the failure of address assignment ?

A. show ip dhcp database


B. show ip dhcp pool
C. show ip dhcp import
D. show ip dhcp server statistics

Correct Answer: B
Section: part 5
Explanation

Explanation/Reference:

QUESTION 202
which three technical services support cloud computing ?

A. network-monitored power sources


B. layer 3 network routing
C. ip localization
D. redundant connections
E. VPN connectivity
F. extended SAN services

Correct Answer: BCF


Section: part 5
Explanation

Explanation/Reference:
Four technical services are essential to supporting the high level of flexibility, resource availability, and
transparent resource connectivity required for cloud computing:
- The Layer 3 network offers the traditional routed interconnection between remote sites and provides end-
user access to cloud services.
-The extended LAN between two or more sites offers transparent transport and supports application and
operating system mobility.
- Extended SAN services support data access and accurate data replication.
-IP Localization improves northbound and southbound traffic as well as server-to-server workflows.

QUESTION 203
which two steps must you perform to enbale router-on-stick on a switch ?(choose two)

A. connect the router to a trunk port


B. config the subint number exactly the same as the matching VLAN
C. config full duplex
D. cofigure an ip route to the vlan destn net
E. assign the access port to the vlan

Correct Answer: AE
Section: part 5
Explanation

Explanation/Reference:

QUESTION 204
which address prefix does OSPFv3 use when multiple IPv6 address are configured on a
single interface ?

A. all prefix on the interface


B. the prefix that the administrator configure for OSPFv3 use
C. the lowest prefix on the interface
D. the highest prefix on the interface

Correct Answer: A
Section: part 5
Explanation

Explanation/Reference:

QUESTION 205
which IP configuration does the CIDR notation 192.168.1.1/25 refer?
A. 192.168.1.1 255.255.255.64
B. 192.168.1.1 255.255.255.1
C. 192.168.1.1 255.255.255.32
D. 192.168.1.1 255.255.255.128
E. 192.168.1.1 255.255.255.256

Correct Answer: D
Section: part 5
Explanation

Explanation/Reference:

QUESTION 206
Which option is the correct CIDR notation for 192.168.0.0 subnet 255.255.255.252 ?

A. 30
B. 31
C. 32
D. 33

Correct Answer: A
Section: part 5
Explanation

Explanation/Reference:

QUESTION 207
Which two of these statements regarding RSTP are correct? (Choose two.)

A. RSTP cannot operate with PVST+.


B. RSTP defines new port roles.
C. RSTP defines no new port states.
D. RSTP is a proprietary implementation of IEEE 802.1D STP.
E. RSTP is compatible with the original IEEE 802.1D STP.

Correct Answer: BE
Section: part 5
Explanation

Explanation/Reference:
RSTP定义了新的端口类型,包括隔离端口,备份端口等,rstp如果与stp同时存在的话。那么将兼容成stp

QUESTION 208
What is known as one-to-nearest addressing in IPv6?

A. global unicast
B. anycast
C. multicast
D. unspecified address

Correct Answer: B
Section: part 5
Explanation

Explanation/Reference:

QUESTION 209
Which path does a router choose when it receives a packet with multiple possible paths
to the destination over
different routing protocols?

A. the path with both the lowest administrative distance and the highest metric
B. the path with the lowest administrative distance
C. the path with the lowest metric
D. the path with both the lowest administrative distance and lowest metric

Correct Answer: B
Section: part 5
Explanation

Explanation/Reference:
http://www.ciscopress.com/articles/article.asp?p=2180208&seqNum=9

QUESTION 210
Requirement to configure DHCP binding ( choose two)

A. DHCP pool
B. ip address
C. Hardware address
D. http://bbs.hh010.com

Correct Answer: BC
Section: part 5
Explanation

Explanation/Reference:

QUESTION 211
how to see dhcp conflict?

A. show ip dhcp pool


B. show dhcp database
C. show ip dhcp conflict
D. http://bbs.hh010.com/

Correct Answer: C
Section: part 5
Explanation

Explanation/Reference:
QUESTION 212
Which Cisco platform can verify ACLs?

A. Cisco Prime Infrastructure


B. Cisco Wireless LAN Controller
C. Cisco APIC-EM
D. Cisco IOS-XE

Correct Answer: C
Section: part 5
Explanation

Explanation/Reference:

QUESTION 213
Which type of mac address is aged automatically by the switch?

A. Dynamic
B. Static
C. automatic
D. manual

Correct Answer: A
Section: part 5
Explanation

Explanation/Reference:

QUESTION 214
Which major component of the network virtualization architecture isolate users according
to policy?

A. policy enforcement
B. access control
C. network services virtualization
D. Path Isolation.

Correct Answer: B
Section: part 5
Explanation

Explanation/Reference:

QUESTION 215
Which two statements about firewalls are true ?

A. They can be used with an intrusion prevention system


B. They can limit unauthorized user access to protect data
C. Each wireless access point requires its own firewall
D. They must be placed only at locations where the private network connects to the internet
E. They can prevent attacks from the internet only

Correct Answer: AB
Section: part 5
Explanation

Explanation/Reference:

QUESTION 216
Which two statements about data VLANs on access ports are true ? ( Choose two)

A. They can be configured as trunk ports


B. Two or more VLANs can be configured on the interface
C. 802.1Q encapsulation must be configured on the interface
D. Exactly one VLAN can be configured on the interface.
E. They can be configured as host ports.

Correct Answer: DE
Section: part 5
Explanation

Explanation/Reference:

QUESTION 217
Where does the configuration reside when a helper address is configured to support
DHCP ?

A. on the switch trunk interface.


B. on the router closest to the client.
C. on the router closest to the server.
D. on every router along the path.

Correct Answer: B
Section: part 5
Explanation

Explanation/Reference:

QUESTION 218
How does NAT overloading provide one-to-many address translation?

A. It uses a pool of addresses


B. It converts IPV4 addresses to unused IPv6 Addresses
C. It assigns a unique TCP/UDP port to each session
D. It uses virtual MAC Address and Virtual IP Addresses

Correct Answer: C
Section: part 5
Explanation

Explanation/Reference:
QUESTION 219
Which three options are types of Layer 2 network attack ? (Choose three)

A. Spoofing attacks
B. Vlan Hopping
C. botnet attacks
D. DDOS attacks
E. ARP Attacks
F. Brute force attacks

Correct Answer: ABE


Section: part 5
Explanation

Explanation/Reference:

QUESTION 220
How many broadcast domains are shown in the graphic assuming only the default vlan is configured on the
switches?

A. one
B. six
C. twelve
D. two

Correct Answer: A
Section: part 5
Explanation

Explanation/Reference:
一个vlan为一个广播域,图中有两个交换机,但是只有一个默认的vlan,所以只有一个广播域

QUESTION 221
Afar you apply the given configuration to R1, you notice that it failed to enable OSPF
Which action can you take to correct the problem?
A. Configure a loopback interface on R1
B. Enable IPv6 unicast routing on R1.
C. Configure an IPv4 address on interface F0/0.
D. Configure an autonomous system number on OSPF.

Correct Answer: B
Section: part 5
Explanation

Explanation/Reference:

QUESTION 222
What does split-horizon do?

A. Prevent routing loop in distance vector protocol


B. Prevent switching loop in distance vector protocol
C. Prevent switching loop in link-state protocol
D. Prevent routing loop in link-state protocol

Correct Answer: A
Section: part 5
Explanation

Explanation/Reference:

QUESTION 223
Refer to the exhibit. Which three statements correctly describe Network Device A? (Choose three.)
A. With a network wide mask of 255.255.255.128, each interface does not require an IP address.
B. With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique
IP subnet.
C. With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate
with each other.
D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate
with each other.
E. With a network wide mask of 255.255.254.0, each interface does not require an IP address.

Correct Answer: BDE


Section: part 5
Explanation

Explanation/Reference:
如图,哪三个选项正确的描述了网络设备A?
考点分析:这题考的是子网掩码的问题。使用掩码255.255.255.128和255.255.255.0时,两台主机的IP地址
属于两个网段,所以A要用路由器(三层设备)才能通信,所以A设备每个接口需要设置IP地址。使用掩码
255.255.254.0是,两台主机属于同一个网段,所以A要使用switch或hub就能通信,且不需要ip地址

QUESTION 224
Refer to the exhibit. At the end of an RSTP election process, which access layer switch port will assume
the discarding role?
A. Switch3, port fa0/1
B. Switch3, port fa0/12
C. Switch4, port fa0/11
D. Switch4, port fa0/2
E. Switch3, port Gi0/1
F. Switch3, port Gi0/2

Correct Answer: C
Section: part 5
Explanation

Explanation/Reference:
SW1为跟桥,SW4会选择一个端口作为根端口,另一个堵塞。在两个端口cost相同的情况下,选择端口号
小的为跟端口,端口号大的堵塞。

QUESTION 225
Refer to the exhibit. Why is flash memory erased prior to upgrading the IOS image from the TFTP server?
A. The router cannot verify that the Cisco IOS image currently in flash is valid
B. Flash memory on Cisco routers can contain only a single IOS image.
C. Erasing current flash content is requested during the copy dialog.
D. In order for the router to use the new image as the default, it must be the only IOS image in flash.

Correct Answer: C
Section: part 5
Explanation

Explanation/Reference:

QUESTION 226
Refer to the exhibit. The network shown in the diagram is experiencing connectivity problems. Which of the
following will correct the problems? (Choose two.)

A. Configure the gateway on Host A as 10.1.1.1.


B. Configure the gateway on Host B as 10.1.2.254.
C. Configure the IP address of Host A as 10.1.2.2.
D. Configure the IP address of Host B as 10.1.2.2.
E. Configure the masks on both hosts to be 255.255.255.224.
F. Configure the masks on both hosts to be 255.255.255.240.

Correct Answer: BD
Section: part 5
Explanation

Explanation/Reference:
考查VLSM。网关和主机IP需在同一个子网。路由器子接口IP为这个vlan中主机的网关

QUESTION 227
Which statement about vlan operation on cisco catalyst switches is true?

A. when a packet is received from an 802.1Q trunk,the vlan id can be determined from the source MAC
address table.
B. unkown unicast frames are retransmitted only to the ports that belong to the same vlan
C. ports between switches should be configured in access mode so that vlans can span across the ports
D. broadcast and multicast frames are retransmitted to ports that are configured on different vlan

Correct Answer: B
Section: part 5
Explanation

Explanation/Reference:
A通过源mac地址确定vlan,不正确
B未知单播帧只在本vlan传播,正确
C交换机之间应该设置为trunk
Dvlan能分割广播域,广播不能跨vlan传输

QUESTION 228
When a router is unable to find a known route in the routing table,how dose it handle the pacet?

A. It sends the packet to the next hop address


B. It sends the packet to the gateway of last resort
C. It discards the packet
D. It sends the packet over the route with the best metric

Correct Answer: C
Section: part 5
Explanation

Explanation/Reference:

QUESTION 229
For what two purposes does the Ethernet protocol use physical addresses? (Choose two.)

A. to uniquely identify devices at Layer 2


B. to allow communication with devices on a different network
C. to differentiate a Layer 2 frame from a Layer 3 packet
D. to establish a priority system to determine which device gets to transmit first
E. to allow communication between different devices on the same network
F. to allow detection of a remote device when its physical address is unknown

Correct Answer: AE
Section: part 5
Explanation

Explanation/Reference:

QUESTION 230
Which command can you enter to display the operational status of the network ports on a router?

A. show interface switchport


B. show ip interface brief
C. show running-config interface fastethernet 0/1
D. show interface status

Correct Answer: B
Section: part 5
Explanation

Explanation/Reference:
QUESTION 231
Refer to the graphic. R1 is unable to establish an OSPF neighbor relationship with R3. What are possible
reasons for this problem? (Choose two.)

A. All of the routers need to be configured for backbone Area 1.


B. R1 and R2 are the DR and BDR, so OSPF will not establish neighbor adjacency with R3.
C. A static route has been configured from R1 to R3 and prevents the neighbor adjacency from being
established.
D. The hello and dead interval timers are not set to the same values on R1 and R3.
E. EIGRP is also configured on these routers with a lower administrative distance.
F. R1 and R3 are configured in different areas.

Correct Answer: DF
Section: part 5
Explanation

Explanation/Reference:

QUESTION 232
Which switch would STP choose to become the root bridge in the selection process?

A. 32768: 11-22-33-44-55-66
B. 32768: 22-33-44-55-66-77
C. 32769: 11-22-33-44-55-65
D. 32769: 22-33-44-55-66-78

Correct Answer: A
Section: part 5
Explanation

Explanation/Reference:
stp选举跟桥首先比较优先级大小.然后比较mac地址大小

QUESTION 233
Refer to exhibit. Which command can you enter to verify link speed and duplex setting on the interface?

A. router# show protocols


B. router#show startup-config
C. router#show line
D. router#show interface gig0/1
Correct Answer: D
Section: part 5
Explanation

Explanation/Reference:

QUESTION 234
Which IEEE mechanism is responsible for the authentication of devices when they attempt to connect to
a local network?

A. 802.1x
B. 802.11
C. 802.2x
D. 802.3x

Correct Answer: A
Section: part 5
Explanation

Explanation/Reference:

QUESTION 235
If router R1 knows a static route to a destination network and then learns about the same destination
network through a dynamic routing protocol, how does R1 respond?

A. It refuses to advertise the dynamic route to other neighbors


B. It sends a withdrawal signal to the neighboring router
C. It disables the routing protocol
D. It prefers the static route

Correct Answer: D
Section: part 5
Explanation

Explanation/Reference:

QUESTION 236
Which two statements about floating static routes are true? (Choose two)

A. They are routes to the exact /32 destination address


B. They are used when a route to the destination network is missing
C. They have a higher administrative distance than the default static route administrative distance
D. They are used as back-up routes when the primary route goes down
E. They are dynamic routes that are learned from a server

Correct Answer: CD
Section: part 5
Explanation

Explanation/Reference:
QUESTION 237
When you enable PortFast on a switch port, the port immediately transitions to which state?

A. Blocking
B. Forwarding
C. Learning
D. Listening

Correct Answer: B
Section: part 5
Explanation

Explanation/Reference:

QUESTION 238
Refer to the exhibit. If R1 receives a packet destined to 172.16.1.1, to which IP address does it send the
packet?

A. 192.168.14.4
B. 192.168.12.2
C. 192.168.13.3
D. 192.168.15.5

Correct Answer: A
Section: part 5
Explanation
Explanation/Reference:

QUESTION 239
What is the danger of the permit any entry in a NAT access list?

A. It can lead to overloaded resources on the router


B. It can cause too many addresses to be assigned to the same interface.
C. It can disable the overload command.
D. It prevents the correct translation of IP addresses on the inside network.

Correct Answer: A
Section: part 5
Explanation

Explanation/Reference:

QUESTION 240
How does a DHCP server dynamically assign IP addresses to hosts?

A. Addresses are permanently assigned so that the host uses the same address at all times
B. Addresses are assigned for a fixed period of time. At the end of the period, a new request for an
address must be made, and another address is then assigned.
C. Addresses are leased to hosts. A host will usually keep the same address by periodically contacting the
DHCP server to renew the lease.
D. Addresses are allocated after a negotiation between the server and the host to determine the length of
the agreement.

Correct Answer: C
Section: part 5
Explanation

Explanation/Reference:
在DHCP租约期限一半时,DHCP客户端会提交租约续订请求到DHCP服务器。如果DHCP服务器在联机状
态,那么通常DHCP服务器会接受续订,然后租约周期重新开始。如果DHCP服务器不可用那么DHCP客户
端会在剩余一半的租约周期过去后尝试再次续订DHCP租约。如果在租约时间的87.5%过去后DHCP服务器
仍然不可用,DHCP客户端会尝试寻找一个新的DHCP服务器,并可能获取一个不同的IP地址。

QUESTION 241
Which command can you enter to determine the addresses that have been assigned on a DHCP
Server?

A. show ip DHCP statistic


B. show ip dhcp pool
C. show ip dhcp binding
D. show ip dhcp database

Correct Answer: C
Section: part 5
Explanation

Explanation/Reference:

QUESTION 242
Refer to the exhibit.What two results would occur if the hub were to be replaced with a switch that is
configured with one Ethernet VLAN?(choose two)
A. The number of collision domains would decrease.
B. The number of collision domains would increase.
C. The number of broadcast domains would remain the same.
D. The number of collision domains would remain the same.
E. The number of broadcast domains would increase.

Correct Answer: BC
Section: part 5
Explanation

Explanation/Reference:
hub不可以隔离冲突域,所有端口同一个冲突域中 , 交换机可以隔离冲突域,每个端口在不同冲突域中,
故换成交换机冲突域个数会增加,大小会减小,而hub 交换机都不可隔离广播域 所有端口都在同一个广播
域中,故广播域数量不变
A 冲突域数量减少
B 冲突域数量增加
C 广播域数量不变
D 冲突域数量不变
E 广播域数量增加

QUESTION 243
Refer to the exhibit, you determine that Computer A cannot ping Computer
Which reason for the problem is most likely true?
A. The Subnet mask for Computer A is incorrect
B. The default gateway address for Computer A is incorrect
C. The subnet mask for computer B is incorrect.
D. The default gateway address for computer B is incorrect

Correct Answer: A
Section: part 5
Explanation

Explanation/Reference:

QUESTION 244
Which effect of the passive-interface command on R1 is true?

A. It prevents interface Fa0/0 from sending updates.


B. Interface Fa 0/0 operates in RIPv1 mode.
C. It removes the 172.16.0.0 network from all updates on all interfaces on R1.
D. It removes the 172.16.0.0 network from all updates on all interfaces on R1.

Correct Answer: A
Section: part 5
Explanation

Explanation/Reference:
QUESTION 245
Which three encapsulation layers in the OSI model are combined into the TCP/IP application layer?(Choose
three)

A. Session
B. transport
C. presentation
D. application
E. data-link
F. network

Correct Answer: ACD


Section: part 5
Explanation

Explanation/Reference:

QUESTION 246
When is the most appropriate time to escalate an issue that you troubleshooting?

A. When you lack the proper to resolve the issue.


B. When a more urgent issue that requires your intervention is detected
C. When you have gathered all information about an issue
D. When you have been unable to resolve the issue after 30 min

Correct Answer: C
Section: part 5
Explanation

Explanation/Reference:

QUESTION 247
Which two command can you enter to display the current time sources statistics on devices ? (Choose
two)

A. Show ntp associations.


B. Show clock details
C. Show clock.
D. Show time.
E. Show ntp status

Correct Answer: AE
Section: part 5
Explanation

Explanation/Reference:
QUESTION 248
Which address class includes network 191.168.0.1/27?

A. Class C
B. Class B
C. Class D
D. Class A

Correct Answer: B
Section: part 5
Explanation

Explanation/Reference:

QUESTION 249
On which type of port can switches interconnect for multi-VLAN communication?

A. interface port
B. access port
C. switch port
D. trunk port

Correct Answer: D
Section: part 5
Explanation

Explanation/Reference:

QUESTION 250
Refer to the exhibit. If R1 sends traffic to 192.168.101.45 the traffic is sent through which interface?

A. FastEthernet0/1
B. FastEthernet0/0
C. FastEthernet1/0
D. FastEthernet1/1

Correct Answer: D
Section: part 5
Explanation
Explanation/Reference:

QUESTION 251
How does a router handle an incoming packet whose destination network is missing from the Routing
table?

A. it discards the packet.


B. it broadcasts the packet to each network on the router.
C. it routes the packet to the default route.
D. it broadcasts the packet to each interface on the router

Correct Answer: A
Section: part 6
Explanation

Explanation/Reference:

QUESTION 252
Which IPV6 function serves the same purpose as ARP entry verification on an IPv4 network?

A. interface ip address verification


B. MAC address table verification
C. neighbor discovery verification
D. Routing table entry verification

Correct Answer: C
Section: part 6
Explanation

Explanation/Reference:

QUESTION 253
Which HSRP feature was new in HSRPv2?

A. VLAN group numbers that are greater than 255


B. Virtual MAC addresses
C. tracking
D. preemption

Correct Answer: A
Section: part 6
Explanation

Explanation/Reference:

QUESTION 254
When you troubleshoot an IPv4 connectivity issue on a router, which three router configuration checks you
must perform?(choose three)

A. Verify that the router interface IP address IP address is correct.


B. Verify that the DNS is configured correctly.
C. Verify that the router and the host use the same subnet mask.
D. Verify that the router firmware is up-to-date.
E. Verify that a default route is configured.
F. Verify that the route appears in the Routing table

Correct Answer: ACF


Section: part 6
Explanation

Explanation/Reference:

QUESTION 255
Configuration of which option is required on a Cisco switch for the Cisco IP phone to work?

A. PortFast on the interface


B. the interface as an access port to allow the voice VLAN ID
C. a voice VLAN ID in interface and global configuration mode
D. Cisco Discovery Protocol in global configuration mode

Correct Answer: B
Section: part 6
Explanation

Explanation/Reference:

QUESTION 256
Which method does a connected trunk port use to tag VLAN traffic?

A. IEEE 802 1w
B. IEEE 802 1D
C. IEEE 802 1Q
D. IEEE 802 1p

Correct Answer: C
Section: part 6
Explanation

Explanation/Reference:

QUESTION 257
Which RFC was created to alleviate the depletion of IPv4 public addresses?

A. RFC 4193
B. RFC 1519
C. RFC 1518
D. RFC 1918

Correct Answer: D
Section: part 6
Explanation

Explanation/Reference:

QUESTION 258
What is the default lease time for a DHCP binding?
A. 24 hours
B. 12 hours
C. 48 hours
D. 36 hours

Correct Answer: A
Section: part 6
Explanation

Explanation/Reference:

QUESTION 259
Which NAT type is used to translate a single inside address to a single outside address?

A. dynamic NAT
B. NAT overload
C. PAT
D. static NAT

Correct Answer: D
Section: part 6
Explanation

Explanation/Reference:

QUESTION 260
Which network topology allows all traffic to flow through a central hub

A. bus
B. star
C. mesh
D. ring

Correct Answer: B
Section: part 6
Explanation

Explanation/Reference:

QUESTION 261
Which statement about a router on a stick is true?

A. Its date plane router traffic for a single VI AN over two or more switches
B. It uses multiple subinterfaces of a single interface to encapsulate traffic for different VLANs on the same
subnet
C. It requires the native VLAN to be disabled
D. It uses multiple subinterfaces of a single interface to encapsulate traffic for different VLANs.

Correct Answer: D
Section: part 6
Explanation

Explanation/Reference:

QUESTION 262
By default, how many MAC addresses are permitted to be learned on a switch port with port security
enabled?

A. 8
B. 2
C. 1
D. 0

Correct Answer: C
Section: part 6
Explanation

Explanation/Reference:

QUESTION 263
Which device allows users to connect to the network using a single or double radio?

A. access point
B. switch
C. wireless controller
D. firewall

Correct Answer: A
Section: part 6
Explanation

Explanation/Reference:

QUESTION 264
When enabled, which feature prevents routing protocols from sending hello messages on an interface?

A. virtual links
B. passive-interface
C. directed neighbors
D. OSPF areas

Correct Answer: B
Section: part 6
Explanation

Explanation/Reference:

QUESTION 265
Refer to the exhibit. Which statement describes the effect of this configuration?
A. The VLAN 10 VTP configuration is displayed
B. VLAN 10 spanning-tree output is displayed
C. The VLAN 10 configuration is saved when the router exits VLAN configuration mode
D. VLAN 10 is added to the VLAN database

Correct Answer: C
Section: part 6
Explanation

Explanation/Reference:

QUESTION 266
Which route source code represents the routing protocol with a default administrative distance of 90 in the
routing table?

A. S
B. E
C. D
D. R
E. O

Correct Answer: C
Section: part 6
Explanation

Explanation/Reference:

QUESTION 267
Which statement about native VLAN traffic is true?

A. Cisco Discovery Protocol traffic travels on the native VLAN by default


B. Traffic on the native VLAN is tagged with 1 by default
C. Control plane traffic is blocked on the native VLAN.
D. The native VLAN is typically disabled for security reasons

Correct Answer: A
Section: part 6
Explanation

Explanation/Reference:

QUESTION 268
Which statement about unicast frame forwarding on a switch is true?
A. The TCAM table stores destination MAC addresses
B. If the destination MAC address is unknown, the frame is flooded to every port that is configured in the
same VLAN except on the port that it was received on.
C. The CAM table is used to determine whether traffic is permitted or denied on a switch
D. The source address is used to determine the switch port to which a frame is forwarded

Correct Answer: B
Section: part 6
Explanation

Explanation/Reference:

QUESTION 269
Which component of the routing table ranks routing protocols according to their preferences?

A. administrative distance
B. next hop
C. metric
D. routing protocol code

Correct Answer: A
Section: part 6
Explanation

Explanation/Reference:

QUESTION 270
Which two authentic methods are compatible with MLPPP on a serial Interface?(choose
two)

A. PEAP
B. CHAP
C. TACACS+
D. PAP
E. LEAP

Correct Answer: BD
Section: part 6
Explanation

Explanation/Reference:

QUESTION 271
What is the effect of the overload keyword in a static NAT translation configuration?

A. It enables port address translation


B. It enables the use of a secondary pool of IP addresses when the first pool is depleted.
C. It enables the inside interface to receive traffic.
D. It enables the outside interface to forward traffic.

Correct Answer: A
Section: part 6
Explanation

Explanation/Reference:

QUESTION 272
Which two statements about VTP are true? (Choose two.)

A. All switches must be configured with the same VTP domain name
B. All switches must be configured to perform trunk negotiation.
C. All switches must be configured with a unique VTP domain name
D. The VTP server must have the highest revision number in the domain
E. All switches must use the same VTP version.

Correct Answer: AD
Section: part 6
Explanation

Explanation/Reference:

QUESTION 273

Refer to the exhibit. On R1 which routing protocol is in use on the route to


192.168.10.1?

A. RIP
B. OSPF
C. IGRP
D. EIGRP

Correct Answer: D
Section: part 6
Explanation

Explanation/Reference:

QUESTION 274
Which two options are the best reasons to use an IPV4 private IP space?(choose two)

A. to enable intra-enterprise communication


B. to implement NAT
C. to connect applications
D. to conserve global address space
E. to manage routing overhead

Correct Answer: AD
Section: part 6
Explanation

Explanation/Reference:

QUESTION 275
Refer to the exhibit. What switch proves the spanning-tree designated
port role for the network segment that services the printers?

A. Switch1
B. Switch2
C. Switch3
D. Switch4

Correct Answer: C
Section: part 6
Explanation

Explanation/Reference:
题目求哪一个交换机为打印机提供指定端口?
由图可知S1 是根桥。指定端口是基于网段间选举的。
S3--S4 之间S3 的BID 比S4 小,所以S3-S4 之间的指定端口在S3 上。
QUESTION 276
Assuming a subnet mask of 255.255.248.0, three of the following addresses are valid host addresses.
Which are these addresses? (Choose three.)

A. 172.16.9.0
B. 172.16.8.0
C. 172.16.31.0
D. 172.16.20.0

Correct Answer: ACD


Section: part 6
Explanation

Explanation/Reference:

QUESTION 277
Which type does a port become when it receives the best BPDU on a bridge?

A. The designated port


B. The backup port
C. The alternate port
D. The root port

Correct Answer: D
Section: part 6
Explanation

Explanation/Reference:

QUESTION 278
Which value can you modify to configure a specific interface as the preferred forwarding interface?

A. The interface number


B. The port priority
C. The VLAN priority
D. The hello time

Correct Answer: B
Section: part 6
Explanation

Explanation/Reference:
QUESTION 279
Which statement about VLAN configuration is true?

A. The switch must be in VTP server or transparent mode before you can configure a VLAN
B. The switch must be in config-vlan mode before you configure an extended VLAN
C. Dynamic inter-VLAN routing is supported on VLAN2 through VLAN 4064
D. A switch in VTP transparent mode save the VLAN databases to the running configuration only

Correct Answer: A
Section: part 6
Explanation

Explanation/Reference:

QUESTION 280
In which two situations should you use out-of-band management?

A. when a network device fails to forward packets


B. when you require ROMMON access
C. when management applications need concurrent access to the device
D. when you require administrator access from multiple locations
E. when the control plane fails to respond

Correct Answer: AB
Section: part 6
Explanation

Explanation/Reference:

QUESTION 281
Which command can you enter to configure a local username with an encrypted password and EXEC
mode user privileges?

A. Router(config)#username jdone privilege 1 password 7 08314D5D1A48


B. Router(config)#username jdone privilege 1 password 7 PASSWORD1
C. Router(config)#username jdone privilege 15 password 0 08314D5D1A48
D. Router(config)#username jdone privilege 15 password 0 PASSWORD1

Correct Answer: A
Section: part 6
Explanation

Explanation/Reference:

QUESTION 282
What happens when an 802.11a node broadcasts within the range of an 802.11g access point?

A. The access point transmits, but the node is unable to receive.


B. A connection occurs
C. Both the node and the access point are unable to transmit.
D. The node transmits, but the access point is unable to receive.
Correct Answer: D
Section: part 6
Explanation

Explanation/Reference:

QUESTION 283
Which value is indicated by the next hop in a routing table?

A. preference of the route source


B. IP address of the remote router for forwarding the packets
C. how the route was learned
D. exit interface IP address for forwarding the packets

Correct Answer: B
Section: part 6
Explanation

Explanation/Reference:

QUESTION 284
Which statement about the inside interface configuration in a NAT deployment is true?

A. It is defined globally
B. It identifies the location of source addresses for outgoing packets to be translated using access or route
maps.
C. It must be configured if static NAT is used
D. It identifies the public IP address that traffic will use to reach the internet

Correct Answer: B
Section: part 6
Explanation

Explanation/Reference:

QUESTION 285
Which option is the default switch port port-security violation mode?

A. shutdown
B. protect
C. shutdown vlan
D. restrict

Correct Answer: A
Section: part 6
Explanation
Explanation/Reference:

QUESTION 286
Which entity assigns IPv6 addresses to end users?

A. ICANN
B. APNIC
C. RIR
D. ISPs

Correct Answer: D
Section: part 6
Explanation

Explanation/Reference:

QUESTION 287
which value indicate the distance from the ntp authoritative time source?

A. priority
B. location
C. layer
D. stratum

Correct Answer: D
Section: part 6
Explanation

Explanation/Reference:

QUESTION 288
Which NTP type designates a router without an external reefrence clock as an authoritative time source?

A. server
B. peer
C. master
D. client

Correct Answer: C
Section: part 6
Explanation

Explanation/Reference:

QUESTION 289
Which 3 feature are represented by A letter in AAA? (Choose Three)
A. authorization
B. accounting
C. authentication
D. accountability
E. accessibility
F. authority

Correct Answer: ABC


Section: part 6
Explanation

Explanation/Reference:

QUESTION 290
When you deploy multilink PPP on your network, where must you configure the group IP Address on each
device?

A. in the global config


B. Under serial interface
C. Under the routing protocol
D. Under the multilink interface

Correct Answer: D
Section: part 6
Explanation

Explanation/Reference:

QUESTION 291
What are two statement for SSH?

A. use port 22
B. unsecured
C. encrypted
D. most common remote-access method
E. operate at transport

Correct Answer: AC
Section: part 6
Explanation

Explanation/Reference:

QUESTION 292
Host is able to ping a web server but it is not able to do HTTP request.

A. ACL blocking port 23


B. ACL blocking All ports
C. ACL blocking port 80
D. ACL blocking port 443
E. None of the above
Correct Answer: C
Section: part 6
Explanation

Explanation/Reference:

QUESTION 293
Which NTP command configures the local devices as an NTP reference clock source?

A. NTP Peer
B. NTP Broadcast
C. NTP Master
D. NTP Server

Correct Answer: C
Section: part 6
Explanation

Explanation/Reference:

QUESTION 294
Which item represents the standard IP ACL?

A. Access-list 110 permit any any


B. Access-list 50 deny 192.168.1.1 0.0.0.255
C. Access list 101 deny tvp any host 192.168.1.1
D. Access-list 2500 deny tcp any host 192.168.1.1 eq 22

Correct Answer: B
Section: part 6
Explanation

Explanation/Reference:

QUESTION 295
Which statement about recovering a password on a Cisco router is true?

A. The default reset password is cisco


B. It requires a secure SSl/VPN connection
C. A factory resset is required if you forget the password
D. It requires physical access to the router

Correct Answer: D
Section: part 6
Explanation

Explanation/Reference:
QUESTION 296
Where information about untrusted hosts are stored?

A. CAM table
B. Trunk table
C. MAC table
D. binding database

Correct Answer: D
Section: part 6
Explanation

Explanation/Reference:
Builds and maintains the DHCP snooping binding database, which contains information about untrusted
hosts with leased IP addresses.

QUESTION 297
Which two options are primary responsibilities of the APlC-EM controller? (Choose two.)

A. lt automates network actions between different device types


B. lt provides robust asset management.
C. lt tracks license usage and Cisco lOS versions.
D. lt automates network actions between legacy equipment.
E. lt makes network functions programmable.

Correct Answer: AE
Section: part 6
Explanation

Explanation/Reference:

QUESTION 298
Which type of MAC address is aged automatically by the switch?

A. automatic
B. manual
C. dynamic
D. static

Correct Answer: C
Section: part 6
Explanation

Explanation/Reference:

QUESTION 299
Which two statements about TACACS+ are true? (Choose two.)
A. lt can run on a UNlX server.
B. lt authenticates against the user database on the local device.
C. lt is more secure than AAA authentication.
D. lt is enabled on Cisco routers by default.
E. lt uses a managed database.

Correct Answer: AE
Section: part 6
Explanation

Explanation/Reference:

QUESTION 300
If three devices are plugged into one port on a switch and two devices are plugged into a different port,
how many collision domains are on the switch?

A. 2
B. 4
C. 5
D. 6

Correct Answer: A
Section: part 6
Explanation

Explanation/Reference:

QUESTION 301
Which three commands must you enter to create a trunk that allows VLAN 20? (Choose three.)

A. Switch(config-if)#switchport mode dynamic auto


B. Switch(config-if)#switchport mode trunk
C. Switch(config-if)#switchport trunk allowed vlan 20
D. Switch(config-if)#switchport mode dynamic desirable
E. Switch(config-if)#switchport trunk encapsulation dotlq
F. Switch(config-if)#switchport trunk native vlan 20

Correct Answer: BCE


Section: part 7
Explanation

Explanation/Reference:

QUESTION 302
Which two passwords must be supplied in order to connect by Telnet to a properly secured Cisco switch
and make changes to the device configuration? (Choose two.)

A. tty password
B. enable secret password
C. vty password
D. aux password
E. console password
F. username password
Correct Answer: BC
Section: part 7
Explanation

Explanation/Reference:

QUESTION 303
In order to comply with new auditing standards, a security administrator must be able to correlate
system security alert logs directly with the employee who triggers the alert. Which of the following
should the security administrator implement in order to meet this requirement?

A. Access control lists on file servers


B. Elimination of shared accounts
C. Group-based privileges for accounts
D. Periodic user account access reviews

Correct Answer: D
Section: part 7
Explanation

Explanation/Reference:

QUESTION 304
If you want multiple hosts on a network, where do you configure the setting?

A. in the IP protocol
B. in the multicast interface
C. in the serial interface
D. in the global configuration

Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:

QUESTION 305
Which option is the benefit of implementing an intelligent DNS for a cloud computing solution?

A. It reduces the need for a backup data center.


B. It can redirect user requests to locations that are using fewer network resources.
C. It enables the ISP to maintain DNS records automatically.
D. It eliminates the need for a GSS.

Correct Answer: B
Section: part 7
Explanation

Explanation/Reference:
QUESTION 306
Which statement about the IP SLAs ICMP Echo operation is true?

A. The frequency of the operation .s specified in milliseconds.


B. It is used to identify the best source interface from which to send traffic.
C. It is used to identify the best source interface from which to send traffic.
D. It is used to determine the frequency of ICMP packets.

Correct Answer: D
Section: part 7
Explanation

Explanation/Reference:

QUESTION 307
Which action can change the order of entries in a named access-list?

A. removing an entry
B. opening the access-list in notepad
C. adding an entry
D. resequencing

Correct Answer: D
Section: part 7
Explanation

Explanation/Reference:

QUESTION 308
Which two components are used to identify a neighbor in a BGP configuration? (Choose two.)

A. autonomous system number


B. version number
C. router ID
D. subnet mask
E. IP address

Correct Answer: AE
Section: part 7
Explanation

Explanation/Reference:
QUESTION 309
Wich component of a routing table entry represents the subnet mask?

A. Routing protocol code


B. Prefix
C. metric
D. Network mask

Correct Answer: D
Section: part 7
Explanation

Explanation/Reference:

QUESTION 310
How can you disable DTP on a switch port?

A. Configure the switch port as a trunk.


B. Add an interface on the switch to a channel group.
C. Change the operational mode to static access
D. Change the administrative mode to access

Correct Answer: D
Section: part 7
Explanation

Explanation/Reference:

QUESTION 311
What are three components that comprise the SNMP framework? (Choose three)

A. MIB
B. manager
C. supervisor
D. agent
E. set
F. AES

Correct Answer: ABD


Section: part 7
Explanation

Explanation/Reference:

QUESTION 312
Which technology can enable multiple VLANs to communicate with one another?

A. inter-VLAN routing using a Layer 3 switch


B. inter-VLAN routing using a Layer 2 switch
C. intra-VLAN routing using router on a stick
D. intra-VLAN routing using a Layer 3 switch

Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:

QUESTION 313
Which command you enter on a switch to display the ip address associated with connected devices?

A. Show cdp neighbors detail


B. Show cdp neighbor
C. Show cdp interface
D. Show cdp traffic

Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:

QUESTION 314
Which protocol is a Cisco proprietary implementation of STP?

A. CST
B. RSTP
C. MSTP
D. PVST+

Correct Answer: D
Section: part 7
Explanation

Explanation/Reference:

QUESTION 315
Which Type of ipv6 unicast ip address is reachable across the internet ?

A. Unique Local
B. Compatible
C. Link local
D. Globa

Correct Answer: D
Section: part 7
Explanation

Explanation/Reference:

QUESTION 316
.Refer to the exhibit . Which Command do you enter so that R1 advertises the loopback0 interface to the
BGP Peers?
A. Network 172.16.1.32 mask 255.255.255.224
B. Network 172.16.1.0 0.0.0.255
C. Network 172.16.1.32 255.255.255.224
D. Network 172.16.1.33 mask 255.255.255.224
E. Network 172.16.1.32 mask 0.0.0.31
F. Network 172.16.1.32 0.0.0.31

Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:

QUESTION 317
Which networking Technology is currently recognized as the standard for computer networking?

A. System network architecture


B. Transmission control protocol/Internet protocol
C. Open system Interconnect
D. Open network architecture

Correct Answer: B
Section: part 7
Explanation

Explanation/Reference:

QUESTION 318
Which two tasks does the Dynamic Host Configuration Protocol perform? (Choose two.)

A. Set the IP gateway to be used by the network


B. Perform host discovery used DHCPDISCOVER message.
C. Configure IP address parameters from DHCP server to a host.
D. Provide an easy management of layer 3 devices.
E. Monitor IP performance using the DHCP server.
F. Assign and renew IP address from the default pool.

Correct Answer: CF
Section: part 7
Explanation
Explanation/Reference:

QUESTION 319
VLAN 3 is not yet configured on your switch.What happens if you set the switchport access vlan 3
commmand interface configuration mode?

A. The command is accepted and the respective VLAN is added to vlan dat.
B. The command is rejected.
C. The command is accepted and you must configure the VLAN manually.
D. The port turns amber.

Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:

QUESTION 320
which command is used to enable CHAP authentication whit PAP as the fallback method on a serial
interface?

A. (config-if)#authentication ppp chap fallback ppp


B. (config-if)#authentication ppp chap pap
C. (config-if)#ppp authentication chap pap
D. (config-if)#ppp authentication chap fallback ppp

Correct Answer: C
Section: part 7
Explanation

Explanation/Reference:
要求使用chap认证,pap认证作为备用

QUESTION 321
What is the effect of using the service password-encryption command?

A. only passwords configured after the command has been entered will be encrypted.
B. Only the enable password will be encrypted.
C. Only the enable secret password will be encrypted
D. It will encrypt the secret password and remove the enable secret password from the configuration.
E. It will encrypt all current and future passwords.

Correct Answer: E
Section: part 7
Explanation

Explanation/Reference:

QUESTION 322
Which two are advantages of static routing when compared to dynamic routing?(choose two)

A. Security increases because only the network administrator may change the routing tables.
B. Configuration complexity decreases as network size increases.
C. Routing updates are automatically sent to neighbors.
D. Route summarization iscompued automatically by the router.
E. Routing traffic load is reduced when used in stub network links
F. An efficient algorithm is used to build routing tables,using automatic updates.
G. Routing tables adapt automatically to topology changes.

Correct Answer: AE
Section: part 7
Explanation

Explanation/Reference:

QUESTION 323
Which of the following are the valid numbers of standard ACL (choosse two)

A. 50
B. 1550
C. 150
D. 1250
E. 2050

Correct Answer: AB
Section: part 7
Explanation

Explanation/Reference:
标准的ACL使用 1 ~ 99 以及1300~1999之间的数字作为表号,扩展的ACL使用 100 ~ 199以及2000~2699之
间的数字作为表号。

QUESTION 324
Three switches are connected to one anther via trunk ports.Assuming the default switch
configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?

A. the switch with the lowest MAC address


B. the switch with the higest MAC address
C. the switch witch the higest IP address
D. the switch with the lowest IP address

Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:
在运行STP协议的网络中选择根桥需要利用桥ID.
桥ID由桥优先级(所有思科交换机上默认优先级为32768)和MAC地址组合来决定的。
在网络中,桥ID最小的网桥成为根桥。
桥ID=桥优先级+桥mac 越小越优先

QUESTION 325
Which command can be used from a PC to verify the connectivity between hosts that connect through a
switch in the same LAN?

A. ping address
B. tracert address
C. traceroute address
D. arp address
Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:

QUESTION 326
Refer to the exhibit. Which two statements are true about interVLAN routing in the topology that is shown
in the exhibit? (Choose two.)

A. Host E and host F use the same IP gateway address.


B. Router1 and Switch2 should be connected via a crossover cable.
C. Router1 will not play a role in communications between host A and host D.
D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces
E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit.
F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using the same
encapsulation type

Correct Answer: DF
Section: part 7
Explanation

Explanation/Reference:
如下图,对于图中拓扑中vlan之间路由,那两个选项是正确的?
考点分析:这道题考的是vlan间的路由,用的是单臂路由的拓扑模型。此拓扑模型是由路由器来完成vlan间
数据流量的转发。如图,Route1不需要更多的Lan接口,它只需要在F0/0口上创建更多的子接口来完成对更
多vlan的接入。所以E错误,这题的正确答案是D,F。
在单臂路由的时候,首先路由器的接口要配置子接口针对每一个vlan一个逻辑接口,其次交换机的接口要配
置trunk,并且封装要和路由器接口的封装一致
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 327
What value is primarily used to determine which port becomes the root port on each nonroot switch in a
spanning-tree topology?

A. lowest port MAC address


B. port priority number and MAC address.
C. VTP revision number
D. highest port priority number.
E. path cost

Correct Answer: E
Section: part 7
Explanation

Explanation/Reference:
此处为选举跟端口,先要比较到跟桥的cost。
如果是选跟桥,先比较优先级

QUESTION 328
Which command enables RSTP on a switch?

A. spanning-tree mode rapid-pvst


B. spanning-tree uplinkfast
C. spanning-tree backbonefast
D. spanning-tree mode mst

Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:

QUESTION 329
A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing
departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?

A. More collision domains will be created.


B. IP address utilization will be more efficient.
C. More bandwidth will be required than was needed previously
D. An additional broadcast domain will be created.

Correct Answer: D
Section: part 7
Explanation

Explanation/Reference:
一个交换机把所有的端口以全双工的模式加到一个vlan里,把一个端口加入到一个新的vlan里会对此交换机
产生什么影响?
考点分析:这道题考的是vlan的概念。将一个交换的端口加入一个新vlan代表一个新的广播域产生了,因为
vlan有隔离广播域的作用

QUESTION 330
Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802.
1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2
the native VLAN is not specified.What will happen in this scenario?

A. 802.1Q giants frames could saturate the link.


B. VLAN 10 on CAT1 and VLAN 1 on CAT2 will send untagged frames.
C. A native VLAN mismatch error message will appear.
D. VLAN 10 on CAT1 and VLAN 1 on CAT2 will send tagged frames.

Correct Answer: C
Section: part 7
Explanation

Explanation/Reference:
交换机CAT1和CAT2通过F0/13端口连接, 交换机之间封装是的802.1q, 在VLAN10中本征VLAN被修改成
CCNA 考试交流QQ群 :464609243
了VLAN10,在CAT2上没有指定。这样配置就会出现什么情况?
考点分析:这道题考的是Trunk。Trunk链路的封装要求两边的本征vlan相同,如果不同,会出现VLAN不匹
配这个错误。
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 331

Refer to the exhibit.All switch ports are assigned to the correct VLANs, but none of the hosts connected to
SwitchA can
communicate with hosts in the same VLAN connected to SwitchB. Based on the output shown, what is the
most likely problem?

A. The access link needs to be configured in multiple VLANs.


B. The link between the switches is configured in the wrong VLAN.
C. The link between the switches needs to be configured as a trunk.
D. VTP is not configured to carry VLAN information between the switches.
E. Switch IP addresses must be configured in order for traffic to be forwarded between the switches

Correct Answer: C
Section: part 7
Explanation

Explanation/Reference:
由图中可知,两个交换机相连接的端口都是access,应该配置成trunk

QUESTION 332
What is the function of the command switchport trunk native vlan 999 on a switch?

A. It designates VLAN 999 for untagged traffic


B. It blocks VLAN 999 traffic from passing on the trunk.
C. It creates a VLAN 999 interface.
D. It designates VLAN 999 as the default for all unkown tagged traffic
Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:
设置vlan999为本征vlan,交换机默认本征vlan为vlan1.此题正确答案为A.
本征VLAN(Native Vlan)分配给 802.1Q中继端口。802.1Q中继端口支持来自多个VLAN的流量(有标记
流量),也支持来自VLAN以外的流量(无标记流量)。802.1Q中继端口会将无标记流量发送到本征
VLAN。

QUESTION 333
Which parameter or parameters are used to calculate OSPF cost in cisco routers?

A. Bandwidth,Delay,and MTU
B. Bandwidth
C. Bandwidth and MTU
D. Bandwidth , MTU,Reliability,Delay,and Load

Correct Answer: B
Section: part 7
Explanation

Explanation/Reference:

QUESTION 334
Which command shows your active Telnet connections?

A. show session
B. show cdp neighbors
C. show users
D. show queue

Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:
The “show users” shows telnet/ssh connections to your router while “show sessions” shows telnet/ssh
connections from your router (to other devices). The question asks about “your active Telnet connections”,
meaning connections from your router so the answer should be A.

QUESTION 335
Refer to the exhibit.
Based on the exhibited routing table, how will packets from a host within the 192.168.10.192/26 LAN be
forwarded to 192.168.10.1?

A. The router will forward packets from R3 to R2 to R1.


B. The router will forward packets from R3 to R1 to R2.
C. The router will forward packets from R3 to R2 to R1 AND from R3 to R1.
D. The router will forward packets from R3 to R1.

Correct Answer: C
Section: part 7
Explanation

Explanation/Reference:

QUESTION 336
Refer to the exhibit.Which user-mode password has just been set?

A. Telnet
B. Auxiliary
C. SSH
D. Console

Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:

QUESTION 337
Refer to the exhibit. Which rule does the DHCP server use when there is an IP address
conflict?

A. The address is removed from the pool until the conflict is resolved.
B. The address remains in the pool until the conflict is resolved.
C. Only the IP detected by Gratuitous ARP is removed from the pool.
D. Only the IP detected by Ping is removed from the pool.
E. The IP will be shown, even after the conflict is resolved.

Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:

QUESTION 338
How is provided master redundancy on a stacked switches?

A. 1:N
B. N:1
C. 1:1
D. 1+N

Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:
http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3750-series-switches/
prod_white_paper09186a00801b096a.html

QUESTION 339
Refer to the exhibit A frame on vlan 1on switch s1 is sent to switch s2 when the frame is
received on vlan
2,what causes this behavior?

A. trunk mode mismatches


B. vlans that do not correspond to a unique IP subnet
C. native vlan mismatches
D. allowing only vlan 2 on the destination.

Correct Answer: C
Section: part 7
Explanation

Explanation/Reference:
两交换机本征vlan不一样,不能正常通信

QUESTION 340

Refer to the exhibit.Assuming that the entire network topology is shown, what is the operational status of the
interfaces of R2
as indicated by the command output shown?

A. One interface has a problem.


B. Two interfaces have problems.
C. The interfaces are functioning correctly.
D. The operational status of the interfaces cannot be determined from the output shown.

Correct Answer: C
Section: part 7
Explanation

Explanation/Reference:
端口双UP,运行正常
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 341
Why will a switch never learn a broadcast address?

A. Broadcast frames are never sent to swiches.


B. Broadcast addresses use an incorrect format for the switching table.
C. A broadcast address will never be the source address of a frame.
D. Broadcasts only use network layer addressing.
E. A broadcast frame is never forwarded by a switch.

Correct Answer: C
Section: part 7
Explanation

Explanation/Reference:
QUESTION 342
Which definition of default route is true?

A. A route that is manually configured.


B. A route used when a destination route is missing.
C. A route to the exact /32 destination address
D. Dynamic route learned from the server.

Correct Answer: B
Section: part 7
Explanation

Explanation/Reference:

QUESTION 343
Which value must the device send as its username when using CHAP to authenticate
with the remote peer site id:17604704
over a PPP link?

A. The automatically generated user name


B. The local host name
C. The user name defined by the administrator
D. The host name of the remote device.

Correct Answer: B
Section: part 7
Explanation

Explanation/Reference:

QUESTION 344
What can you change to select switch as root bridge?

A. make lower priority


B. make higher priority
C. make lower path cost
D. make higher path cost

Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:
QUESTION 345
Refer to exhibit. What Administrative distance has route to 192.168.10.1 ?

A. 1
B. 90
C. 110
D. 120

Correct Answer: B
Section: part 7
Explanation

Explanation/Reference:

QUESTION 346
Which statement about IPv6 link-local addresses is true ?

A. They must be configured on all IPv6 interface


B. They must be globally unique
C. They must be manually configured
D. They are advertised globally on the network

Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:

QUESTION 347
Which configuration can be used with PAT to allow multiple inside address to be translated to a single
outside address ?

A. Dynamic Routing
B. DNS
C. Preempt
D. overload

Correct Answer: D
Section: part 7
Explanation

Explanation/Reference:
QUESTION 348
Which two types of information are held in the MAC address table? (Choose two)

A. MAC address
B. soure IP address
C. destination IP address
D. Protocols
E. Port numbers

Correct Answer: AE
Section: part 7
Explanation

Explanation/Reference:

QUESTION 349
Which command can you enter to create a NAT pool of 6 addresses?

A. Router(config)#ip nat pool test 175.17.12.69 175.17.12.74 prefix-length 24


B. Router(config)#ip nat pool test 175.17.12.69 175.17.13.74 prefix-length 16
C. Router(config)#ip nat pool test 175.17.12.66 175.17.12.72 prefix-length 8
D. Router(config)#ip nat pool test 175.17.12.69 175.17.12.76 prefix-length 8

Correct Answer: A
Section: part 7
Explanation

Explanation/Reference:

QUESTION 350
Which header field is new on IPv6?

A. Version
B. Hop Limit
C. Flow Label
D. Traffic Class

Correct Answer: C
Section: part 7
Explanation

Explanation/Reference:

QUESTION 351
Which value is used to determine the active router in an HSRP default configuration?

A. Router loopback address


B. Router IP address
C. Router priority
D. Router tracking number

Correct Answer: B
Section: part 8
Explanation

Explanation/Reference:

QUESTION 352
Which three are valid modes for a switch port used as a VLAN trunk? (choose three)

A. Desirable
B. Auto
C. On
D. Blocking
E. Transparent
F. Forwarding

Correct Answer: ABC


Section: part 8
Explanation

Explanation/Reference:

QUESTION 353
Which value must you configure on a device before EIGRP for IPv6 can start running?

A. public IP address
B. loopback interface
C. router ID
D. process ID

Correct Answer: C
Section: part 8
Explanation

Explanation/Reference:

QUESTION 354
Which type of attack can be mitigated by configuring the default native VLAN to be
unused?

A. CAM table overflow


B. switch spoofing
C. VLAN hopping
D. MAC spoofing

Correct Answer: C
Section: part 8
Explanation

Explanation/Reference:
QUESTION 355

Refer to the exhibit. If R1 sends traffic to 192.168.10.45 the traffic is sent through which interface?

A. FastEthernet0/1
B. FastEthernet0/0
C. FastEthernet1/0
D. FastEthernet1/1

Correct Answer: A
Section: part 8
Explanation

Explanation/Reference:

QUESTION 356
Which option describes a difference between EIGRP for IPv4 and IPv6?

A. Only EIGRP for IPv6 advertises all connected networks.


B. Only EIGRP for IPv6 requires a router ID to be configured under the routing process
C. As numbers are configure in EIGRP but not in EIGRPv3.
D. Only EIGRP for IPv6 is enabled in the global configuration mode.

Correct Answer: B
Section: part 8
Explanation

Explanation/Reference:

QUESTION 357
Which option describes the purpose of traffic policing?

A. It prioritizes routing protocol traffic.


B. It remarks traffic that is below the CIR
C. It drops traffic that exceeds the CIR.
D. It queues and then transmits traffic that exceeds the CIR.
Correct Answer: C
Section: part 8
Explanation

Explanation/Reference:

QUESTION 358
Which process is associated with spanning-tree convergence?

A. determining the path cost


B. electing designated ports
C. learning the sender bridge ID
D. assigning the port ID

Correct Answer: B
Section: part 8
Explanation

Explanation/Reference:

QUESTION 359
what is a difference between TACACS+ and RADIUS in AAA?

A. Only TACACS+ allows for separate authentication.


B. Only RADIUS encrypts the entire access-request packet.
C. Only RADIUS uses TCP
D. Only TACACS+ couples authentication and authorization.

Correct Answer: A
Section: part 8
Explanation

Explanation/Reference:

QUESTION 360
Which option is a benefit of switch stacking?

A. It provides redundancy with no impact on resource usage


B. It simplifies adding and removing hosts.
C. It supports better performance of high-needs applications.
D. It provides higher port density with better resource usage.

Correct Answer: D
Section: part 8
Explanation

Explanation/Reference:

QUESTION 361
Which port state is introduced by Rapid-PVST?

A. learning
B. listening
C. discarding
D. forwarding

Correct Answer: C
Section: part 8
Explanation

Explanation/Reference:
Rpvst新增了一种端口角色----discarding

QUESTION 362
What are the possible trunking modes for a switch port? (Choose three.)

A. transparent
B. auto
C. on
D. desirable
E. client
F. forwarding

Correct Answer: BCD


Section: part 8
Explanation

Explanation/Reference:
考点:考查交换机在trunk模式下的模式
auto:不会主动发DTP信息
on:强制成为trunk,也主动发DTP信息
desirable:DTP主动模式,发DTP和对方协商
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 363
Refer to the exhibit. When running OSPF, What would cause router A not to form an adjacency with router
B?

A. The loopback addresses are on different subnets.


B. The value of the dead timers on the router are different.
C. Route summarization is enabled on both routers.
D. The process indentifier on router A is different than the process identifier on router B.
Correct Answer: B
Section: part 8
Explanation

Explanation/Reference:
考点:考查OSPF邻居建立的条件。
区域ID,hello周期,网段,认证等。
A:loopback地址不同网段,错误
B:hello的死亡时间不一样,正确
C:开启了路由汇总,错误。这个没关系
D:两端的路由进程不一致。错误。
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 364
What command instructs the device to timestamp Syslog debug messages in milliseconds?

A. service timestamps log datetime localtime


B. service timestamps debug datetime msec
C. service timestamps debug datetime localtime
D. service timestamps log datetime msec

Correct Answer: B
Section: part 8
Explanation

Explanation/Reference:

QUESTION 365
Refer to the exhibit. What set of commands was configured on interface Fa0/3 to produce the given the
output?

A. interface FastEthernet 0/3


Channel-group 1 mode desirable
Switchport trunk encapsulation dot1q
Switchport mode trunk
B. interface FastEthernet 0/3
Channel-group 2 mode passive
Switchport trunk encapsulation dot1q
Switchport mode trunk
C. interface FastEthernet 0/3
Channel-group 2 mode on
Switchport trunk encapsulation dot1q
Switchport mode trunk
D. interface FastEthernet 0/3
Channel-group 2 mode active
Switchport trunk encapsulation dot1q
Switchport mode trunk

Correct Answer: B
Section: part 8
Explanation
Explanation/Reference:

QUESTION 366
While troubleshooting a connection problem on a computer,you determined that the computer can ping a
specific web server but it
cannot connect to TCP port 80 on that server.Which reason for the problem is most likely ture?

A. A VLAN number is incorrect


B. An ARP table entry is missing
C. A route is missing
D. An ACL is blocking the TCP port

Correct Answer: D
Section: part 8
Explanation

Explanation/Reference:

QUESTION 367
When troubleshooting Ethernet connectivity issues,how can you verify that an IP address is known to a
router?

A. Check whether the IP address is in the routing table


B. Check whether an ACL is blocking the IP address
C. Check whether the IP address is in the CAM table
D. Check whether the IP address is in the ARP table

Correct Answer: D
Section: part 8
Explanation

Explanation/Reference:

QUESTION 368

Refer to the exhibit.After you apply the given configuration to R1, you determine that it is failing to advertise
the 172.16.10.32/27 network .Which action most likely to correct the problem.

A. Enable passive interface


B. Enable RIPv2
C. Enable manual summarization
D. Enable autosummarization.

Correct Answer: B
Section: part 8
Explanation

Explanation/Reference:

QUESTION 369
Which two steps must you perform on each device that is configured for IPv4 routing before you implement
OSPFv3?(Choose two)

A. configure an autonomous system number


B. configure a loopback interface
C. configure a router ID
D. Enable IPv6 on an interface
E. Enable IPv6 unicast routing

Correct Answer: DE
Section: part 8
Explanation

Explanation/Reference:

QUESTION 370
Which option is the main function of congestion management?

A. discarding excess traffic


B. queuing traffic based on priority
C. classifying traffic
D. providing long-term storage of buffered data

Correct Answer: B
Section: part 8
Explanation

Explanation/Reference:

QUESTION 371
Which command must you enter to enable OSPFV2 in an IPV4 network?

A. ip ospf hello-interval seconds


B. router ospfv2 process-id
C. router ospf value
D. router ospf process-id

Correct Answer: D
Section: part 8
Explanation

Explanation/Reference:

QUESTION 372
Refer to the exhibit.If RTR01 is configured as shown,which three addresses will be received by other
routers that are running EIGRP on the
network?(choose three)

A. 192.168.2.0
B. 10.4.3.0
C. 10.0.0.0
D. 172.16.0.0
E. 172.16.4.0
F. 192.168.0.0

Correct Answer: ACD


Section: part 8
Explanation

Explanation/Reference:

QUESTION 373
Which type of secure MAC address must be configured manually?

A. dynamic
B. bia
C. static
D. sticky

Correct Answer: C
Section: part 8
Explanation

Explanation/Reference:

QUESTION 374
Which two options are fields in an Ethernet frame?(choose two)

A. frame check sequence


B. header
C. source IP address
D. destination IP address
E. type

Correct Answer: AE
Section: part 8
Explanation

Explanation/Reference:
QUESTION 375
Where does a switch maintain DHCP snooping information ?

A. in the MAC address table


B. in the CAM table
C. in the DHCP binding database
D. in the VLAN database

Correct Answer: C
Section: part 8
Explanation

Explanation/Reference:

QUESTION 376
To enable router on a router subinterface,which two steps must you perform?(choose two)

A. Configure full duplex and speed


B. configure the subinterface with an IP address
C. Configure an IP route to the VLAN destination network
D. Configure a default to route traffic between subinterface
E. Configure encapsulation dot1q

Correct Answer: BE
Section: part 8
Explanation

Explanation/Reference:

QUESTION 377
Which command can you enter on a switch to determine the current SNMP security model?

A. show snmp group


B. show snmp pending
C. snmp-server contact
D. show snmp engineID

Correct Answer: A
Section: part 8
Explanation

Explanation/Reference:

QUESTION 378
Which statement about spanning-tree root-bridge election is true?

A. It is always performed automatically


B. Each VLAN must have its own root bridge
C. Each VLAN must use the same root bridge
D. Each root bridge must reside on the same root switch
Correct Answer: B
Section: part 8
Explanation

Explanation/Reference:

QUESTION 379
Which two statements about IPv6 address 2002:ab10:beef::/48 are true?(choose two)

A. The embedded IPv4 address can be globally routed.


B. It is used for an ISATAP tunnel
C. The embedded IPv4 address is an RFC 1918 address
D. The MAC address 20:02:b0:10:be:ef is embedded into the IPv6 address
E. It is used for a 6to4 tunnel

Correct Answer: AE
Section: part 8
Explanation

Explanation/Reference:

QUESTION 380
Which step in the router boot process searches for an IOS image to load into the router?

A. bootstrap
B. POST
C. mini-IOS
D. ROMMON mode

Correct Answer: A
Section: part 8
Explanation

Explanation/Reference:

QUESTION 381
What is one benefit of PVST+?

A. PVST+reduces the CPU cycles for all the switches in the network
B. PVST+automatically selects the root bridge location,to provide optimized bandwidth usage.
C. PVST+allow the root switch location to be optimized per vlan.
D. PVST+supports Layer 3 load balancing without loops.

Correct Answer: C
Section: part 8
Explanation

Explanation/Reference:

QUESTION 382
Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)

A. 802.1Q native VLAN frames are untagged by default.


B. 802.1Q trunking ports can also be secure ports.
C. 802.1Q trunks can use 10 Mb/s Ethernet interfaces.
D. 802.1Q trunks require full-duplex, point-to-point connectivity.
E. 802.1Q trunks should have native VLANs that are the same at both ends.

Correct Answer: ACE


Section: part 8
Explanation

Explanation/Reference:

QUESTION 383
Which IEEE standard protocol is initiated as a result of successful DTP completion in a switch over
FastEthernet?

A. 802.3ad
B. 802.1w
C. 802.1Q
D. 802.1d

Correct Answer: C
Section: part 8
Explanation

Explanation/Reference:

QUESTION 384
Which PPP subprotocol negotiates authentication options?

A. NCP
B. LCP
C. ISDN
D. DLCI
E. SLIP

Correct Answer: B
Section: part 8
Explanation

Explanation/Reference:

QUESTION 385
Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.)

A. Global addresses start with 2000::/3.


B. Link-local addresses start with FE00:/12.
C. Link-local addresses start with FF00::/10.
D. There is only one loopback address and it is ::1.
E. If a global address is assigned to an interface, then that is the only allowable address for the interface.

Correct Answer: AD
Section: part 8
Explanation

Explanation/Reference:
globaladdress的其实段位2000::/3这个是定义好了的,D选项说的是换回地址,也就是ipv4的
127.0.0.1这个类似的.所以D正确
QUESTION 386
While troubleshooting a DHCP client that is behaving erratically, you discover that the client has been
assigned the same IP address as a printer that is a staticIP address. Which option is the best way to
resolve the problem?

A. Configurea static route to the client.


B. Assign the client the same IP address as the router.
C. Move the client to another IP subnet
D. Move the printer to another IP subnet.
E. Reserve the printer IP address.

Correct Answer: E
Section: part 8
Explanation

Explanation/Reference:

QUESTION 387
Under which circumstance is a router on a stick most appropriate?

A. When a router have multiple subnets on a single physical link.


B. When a router have single subnet on multiple physical links.
C. When a router have multiple interface on single physical links.
D. When a router have single interface on multiple physical links.

Correct Answer: A
Section: part 8
Explanation

Explanation/Reference:

QUESTION 388
Refer to the exhibit. Given the output from the show ip eigrp topology command, which router is the feasible
successor?

A. 10.1.0.1 (Serial0), from 10.1.0.1, Send flag is 0x0


Composite metric is (46152000/41640000), Route is Internal
Vector metric:
Minimum bandwidth is 64 Kbit
Total delay is 45000 Microseconds
Reliability is 255/255
Load is 1/255
Minimum MTU is 1500
Hop count is 2
B. 10.0.0.2 (Serial0.1), from 10.0.0.2, Send flag is 0x0
Composite metric is (53973248/128256), Route is Internal
Vector Metric:
Minimum bandwidth is 48 Kbit
Total delay is 25000 Microseconds
Reliability is 255/255
Load is 1/255
Minimum MTU is 1500
Hop count is 1
C. 10.1.0.3 (Serial0), from 10.1.0.3, Send flag is 0x0
Composite metric is (46866176/46354176), Route is Internal
Vector metric:
Minimum bandwidth is 56 Kbit
Total delay is 45000 microseconds
Reliability is 255/255
Load is 1/255
Minimum MTU is 1500
Hop count is 2
D. 10.1.1.1 (Serial0.1), from 10.1.1.1, Send flag is 0x0
Composite metric is (46763776/46251776), Route is External
Vector metric:
Minimum bandwidth is 56 Kbit
Total delay is 41000 microseconds
Reliability is 255/255
Load is 1/255
Minimum MTU is 1500
Hop count is 2

Correct Answer: B
Section: part 8
Explanation

Explanation/Reference:
FS的AD必须要小于后继的FD

QUESTION 389
Which symptom can cause duplex mismatch problem?

A. no earner
B. collisions on interface
C. giants
D. CRC errors

Correct Answer: B
Section: part 8
Explanation

Explanation/Reference:

QUESTION 390
Which of the port is not part of STP protocol.

A. Listening
B. Learning
C. Forwarding
D. Discarding

Correct Answer: D
Section: part 8
Explanation

Explanation/Reference:

QUESTION 391
which port security violation mode allows traffic from valid mac address to pass but block traffic from invalid
mac address?

A. protect
B. shutdown
C. shutdown vlan
D. restrict

Correct Answer: A
Section: part 8
Explanation

Explanation/Reference:

QUESTION 392
Which type of routing protocol operates by exchanging the entire routing information ?

A. distance vector protocols


B. link state protocols
C. path vector protocols
D. exterior gateway protocols

Correct Answer: A
Section: part 8
Explanation

Explanation/Reference:

QUESTION 393
Which IPsec security protocol should be used when confidentiality is required?

A. MD5
B. PSK
C. AH
D. ESP

Correct Answer: D
Section: part 8
Explanation

Explanation/Reference:

QUESTION 394
Which IPv6 routing protocol uses multicast group FF02::9 to send updates?

A. static
B. RIPng
C. OSPFv3
D. IS-IS for IPv6

Correct Answer: B
Section: part 8
Explanation

Explanation/Reference:
QUESTION 395
which definition of a host route is true ?

A. A route that is manually configured


B. A route used when a destination route is missing.
C. A route to the exact /32 destination address
D. Dynamic route learned from the server.

Correct Answer: C
Section: part 8
Explanation

Explanation/Reference:

QUESTION 396
which statement about upgrading a cisco IOS device with TFTP server ?

A. the operation is performed in active mode


B. the operation is performed in unencrypted format
C. the operation is performed in passive mode
D. the cisco IOS device must be on the same LAN as the TFTP server

Correct Answer: B
Section: part 8
Explanation

Explanation/Reference:

QUESTION 397
Which statement about DHCP snooping is true?

A. it blocks traffic from DHCP servers on untrusted interfaces.


B. it can be configured on switches and routers.
C. it allows packets from untrusted ports if their source MAC address is found in the binding table.
D. it uses DHCPDiscover packets to identify DHCP servers.

Correct Answer: A
Section: part 8
Explanation

Explanation/Reference:

QUESTION 398
Which three commands are required to enable NTP authentication on a Cisco router? (Choose three)

A. ntp peer
B. ntp max-associations
C. ntp authenticate
D. ntp trusted-key
E. ntp authentication-key
F. ntp refclock

Correct Answer: CDE


Section: part 8
Explanation

Explanation/Reference:

QUESTION 399
Which functionality does an SVI provide?

A. OSI Layer 2 connectivity to switches


B. remote switch administration
C. traffic routing for VLANs
D. OSI Layer 3 connectivity to switches

Correct Answer: C
Section: part 8
Explanation

Explanation/Reference:

QUESTION 400
Which three statements about IPv6 address fd14:920b:f83d:4079::/64 are true? (Choose three)

A. The subnet ID is 14920bf83d


B. The subnet ID is 4079
C. The global ID is 14920bf83d
D. The address is a link-local address
E. The global ID is 4079
F. The address is a unique local address

Correct Answer: BCF


Section: part 8
Explanation

Explanation/Reference:

QUESTION 401
Which three statements about DWDM are true? (Choose three)

A. It allows a single strand of fiber to support bidirectional communications


B. It is used for long-distance and submarine cable systems
C. It can multiplex up to 256 channels on a single fiber
D. It supports both the SDH and SONET standards
E. Each channel can carry up to a 1-Gbps signal
F. It supports simplex communications over multiple strands of fiber

Correct Answer: ABD


Section: part 9
Explanation
Explanation/Reference:

QUESTION 402
If two OSPF neighbors have formed complete adjacency and are exchanging link-state advertisements,
which state have they reached?

A. Exstart
B. 2-Way
C. FULL
D. Exchange

Correct Answer: C
Section: part 9
Explanation

Explanation/Reference:

QUESTION 403
Which tunneling mechanism embeds an IPv4 address within an IPv6 address?

A. Teredo
B. 6to4
C. 4to6
D. GRE
E. ISATAP

Correct Answer: B
Section: part 9
Explanation

Explanation/Reference:

QUESTION 404
Which of the following statements describe the network shown in the graphic? (Choose two.)
A. There are two broadcast domains in the network.
B. There are four broadcast domains in the network.
C. There are six broadcast domains in the network.
D. There are four collision domains in the network.
E. There are five collision domains in the network.
F. There are seven collision domains in the network.

Correct Answer: AF
Section: part 9
Explanation

Explanation/Reference:

QUESTION 405
Which one of these is a valid HSRP Virtual Mac Address?

A. 0000.0C07.AC15
B. 0000.5E00.01A3
C. 0007.B400.AE01
D. 0007.5E00.B301

Correct Answer: A
Section: part 9
Explanation

Explanation/Reference:
HSRP virtual Mac address 0000.0c07.acXX 开头,所以答案要选择0000.0c07.ac开头的选项

QUESTION 406
assuming the default switch configuration which vlan range can be added modified and removed on a
cisco switch?

A. 2 through 1001
B. 1 through 1001
C. 1 through 1002
D. 2 through 1005
Correct Answer: A
Section: part 9
Explanation

Explanation/Reference:
交换机上默认那些是可以修改和移动的vlan。2-1001

QUESTION 407
Refer to the exhibit.Which two statements are true of the interfaces on switch1?(choose two)

A. A hub is connected directly to FastEthernet0/5


B. FastEthernet0/1 is configured as a trunk link.
C. FastEthernet0/5 has statically assigned mac address
D. Interface FastEthernet0/2 has been disable.
E. Multiple devices are connected directly to FastEthernet0/1.
F. FastEthernet0/1 is connected to a host with multiple network interface cards.

Correct Answer: AB
Section: part 9
Explanation
Explanation/Reference:
图中show cdp nei可以看出F0/1,F0/2为连接两个邻居交换机的端口,所以这两个端口为trunk。F0/5端口有
多个mac地址,而且不是trunk,只能是接了一个hub。

QUESTION 408
Refer to the exhibit. How should the FastEthernet0/1 port on the 2950 model switches that are shown in
the exhibit be configured to allow connectivity between all devices?

A. The ports only need to be connected by a crossover cable.


B. SwitchX(config)# interface FastEthernet 0/1
SwitchX(config-if)# switchport mode trunk
C. SwitchX(config)# interface FastEthernet 0/1
SwitchX(config-if)# switchport mode access
SwitchX(config-if)# switchport access vlan 1
D. SwitchX(config)# interface FastEthernet 0/1
SwitchX(config-if)# switchport mode trunk
SwitchX(config-if)# switchport trunk vlan 1
SwitchX(config-if)# switchport trunk vlan 10
SwitchX(config-if)# switchport trunk vlan 20

Correct Answer: B
Section: part 9
Explanation

Explanation/Reference:
fa0/0,fa0/1--此两接口都必须配置成trunk,才能达到vlan间通信
而且sw1和sw2间的链路必须trunk才能带到相同vlan的通信

QUESTION 409
Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose three.)

A. SNMPv3 enhanced SNMPv2 security features


B. SNMPv3 added the Inform protocol message to SNMP.
C. SNMPv2 added the Inform protocol message to SNMP
D. SNMPv3 added the GetBulk protocol messages to SNMP
E. SNMPv2 added the GetBulk protocol message to SNMP.
F. SNMPv2 added the GetNext protocol message to SNMP.

Correct Answer: ACE


Section: part 9
Explanation

Explanation/Reference:

QUESTION 410
which command do use we to see SNMP version

A. show snmp pending


B. show snmp engineID
C. snmp-server something
D. http://bbs.hh010.com

Correct Answer: A
Section: part 9
Explanation

Explanation/Reference:

QUESTION 411
Which protocol does ipv6 use to discover other ipv6 nodes on the same segment?

A. CLNS
B. TCPv6
C. NHRP
D. NDP
E. ARP

Correct Answer: D
Section: part 9
Explanation

Explanation/Reference:

QUESTION 412
What is the most efficient subnet mask for a point to point ipv6 connection?

A. /127
B. /128
C. /64
D. /48
E. /32

Correct Answer: A
Section: part 9
Explanation

Explanation/Reference:

QUESTION 413
What are three features of the IPV6 protocol?(choose three)

A. complicated header
B. plug-and-play
C. no broadcasts
D. checksums
E. optional IPsec
F. autoconfiguration

Correct Answer: BCF


Section: part 9
Explanation

Explanation/Reference:
B即插即用
C没广播地址
F自动设置

QUESTION 414
Why do large OSPF networks use a hierarchical design?(choose three)

A. to confine network instability to single areas of the network.


B. to reduce the complexity of router configuration
C. to speed up convergence
D. to lower costs by replacing routers with distribution layer switches
E. to decrease latency by increasing bandwidth
F. to reduce routing overhead

Correct Answer: ACF


Section: part 9
Explanation

Explanation/Reference:
A把网络的不稳定性局限于单个区域
C加快汇聚
F减少路由负载
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 415
Where does routing occur within the DoD TCP/IP reference model?

A. application
B. internet
C. network
D. transport

Correct Answer: B
Section: part 9
Explanation

Explanation/Reference:
路由发生在DOD模型的哪一层?
注意是DOD模型不是OSI模型
QUESTION 416

If Computer A is sending traffic to computer B, which option is the source ip address when a packet leaves
R1 on
interface F0/1?

A. IP address of the R2 interface F0/1


B. Ip address of computer B
C. Ip address of R1 interface F0/1
D. Ip address of Computer A

Correct Answer: D
Section: part 9
Explanation

Explanation/Reference:

QUESTION 417
Which feature can you use to restrict SNMP queries to a specific OID tree?
A. server group
B. a community
C. a view record
D. an access group

Correct Answer: C
Section: part 9
Explanation

Explanation/Reference:

QUESTION 418
Refer to the exhibit:

after you apply the give configurations to R1 and R2 you notice that OSPFv3 fails to start
Which reason for the problem is most likely true ?

A. The area numbers on R1 and R2 are mismatched


B. The IPv6 network addresses on R1 and R2 are mismatched
C. The autonomous system numbers on R1 and R2 are mismatched
D. The router ids on R1 and R2 are mismatched

Correct Answer: A
Section: part 9
Explanation

Explanation/Reference:

QUESTION 419
Afer you apply the given configuration to a router, the DHCP clients behind the device cannot communicate
with hosts outside of their subnet.
Which action is most likely to correct the problem?
A. Configure the dns server on the same subnet as the clients
B. Activate the dhcp pool
C. Correct the subnet mask
D. configure the default gateway

Correct Answer: D
Section: part 9
Explanation

Explanation/Reference:

QUESTION 420
which command can you enter in a network switch configuration so that learned mac addresses are saved
in configuration as they connect?

A. Switch(config-if)#Switch port-security
B. Switch(config-if)#Switch port-security Mac-address stcky
C. Switch(config-if)#Switch port-security maximum 10
D. Switch(config-if)#Switch mode access

Correct Answer: B
Section: part 9
Explanation

Explanation/Reference:

QUESTION 421
Which RPVST+ port state is excluded from all STP operations?

A. learning
B. forwarding
C. blocking
D. disabled

Correct Answer: D
Section: part 9
Explanation

Explanation/Reference:

QUESTION 422
Which command can you enter to block HTTPS traffic from the whole class A private network range to a
host?

A. R1(config)#access-list 105 deny tcp 10.1.0.0 0.0.255.255 40.0.0.2 0.0.0.0 eq 443


B. R1(config)#access-list 105 deny tcp 10.1.0.0 0.0.255.255 40.0.0.2 0.0.0.0 eq 53
C. R1(config)#access-list 105 deny tcp 10.0.0.0 0.255.255.255 40.0.0.2 0.0.0.0 eq 53
D. R1(config)#access-list 105 deny tcp 10.0.0.0 0.255.255.255 40.0.0.2 0.0.0.0 eq 443

Correct Answer: D
Section: part 9
Explanation

Explanation/Reference:

QUESTION 423
When is a routing table entry identified as directly connected?

A. when the local router is in use as the network default gateway


B. when the network resides on a remote router that is physically connected to the local router
C. when an interface on the router is configure with an ip address and enabled
D. when the route is statically assigned to reach a specific network

Correct Answer: C
Section: part 9
Explanation

Explanation/Reference:

QUESTION 424
Which address block identifies all link-local addresses?

A. FC00::/7
B. FC00::/8
C. FE80::/10
D. FF00::/8

Correct Answer: C
Section: part 9
Explanation

Explanation/Reference:

QUESTION 425
Which option is the industry-standard protocol for EtherChannel ?

A. PAgP
B. LACP
C. Cisco Discovery Protocol
D. DTP

Correct Answer: B
Section: part 9
Explanation

Explanation/Reference:
QUESTION 426
For which two reasons was RFC 1918 address space define (Choose two)

A. to preserve public IPv4 address space


B. to reduce the occurrence of overlapping IP addresses
C. to preserve public IPv6 address space
D. reduce the size of ISP routing tables
E. to support the NAT protocol

Correct Answer: AB
Section: part 9
Explanation

Explanation/Reference:

QUESTION 427
Which two statements about RIPv2 are true? (Choose two)

A. It must be manually enabled after RIP is configured as the routing protocol


B. It uses multicast address 224.0.0.2 to share routing information between peers
C. its default administrative distances 120
D. It is a link-state routing protocol
E. It is an EGP routing protocol

Correct Answer: AC
Section: part 9
Explanation

Explanation/Reference:

QUESTION 428
In which CLI configuration mode can you configure the hostname of a device?

A. line mode
B. interface mode
C. global mode
D. router mode

Correct Answer: C
Section: part 9
Explanation

Explanation/Reference:

QUESTION 429
In which two circumstances are private IPv4 addresses appropriate? (Choose two)

A. on internal hosts that stream data solely to external resources


B. on hosts that communicates only with other internal hosts
C. on the public-facing interface of a firewall
D. on hosts that require minimal access to external resources
E. to allow hosts inside an enterprise to communicate in both directions with hosts
outside the enterprise

Correct Answer: BD
Section: part 9
Explanation

Explanation/Reference:

QUESTION 430
Which two statements about eBGP neighbor relationships are true? (Choose two)

A. The two devices must reside in different autonomous systems


B. Neighbors must be specifically declared in the configuration of each device
C. They can be created dynamically after the network statement is con-figured.
D. The two devices must reside in the same autonomous system
E. The two devices must have matching timer settings

Correct Answer: AB
Section: part 9
Explanation

Explanation/Reference:

QUESTION 431
Which two pieces of information can be shared with LLDP TLVs? (Choose two)

A. device management address.


B. device type
C. spanning-tree topology
D. routing configuration
E. access-list configuration

Correct Answer: AB
Section: part 9
Explanation

Explanation/Reference:

QUESTION 432
Which two statements about UDP are true? (Choose two)

A. It can transmit data at a rate higher than the path capacity


B. It uses a three-way handshake to ensure that traffic is transmitted properly
C. It guarantees packet delivery
D. it includes protection against duplicate packets
E. it can be used for multicast and broadcast traffic

Correct Answer: AE
Section: part 9
Explanation
Explanation/Reference:

QUESTION 433
Which two statements about access points are true? (Choose Two)

A. They can provide access within enterprises and to the public.


B. in Most cases, they are physically connected to other network devices to provide network connectivity
C. They can protect a network from internal and external threats.
D. Most access points provide Wi-Fi and Bluetooth connectivity.
E. They must be hardwired to a modem.

Correct Answer: BD
Section: part 9
Explanation

Explanation/Reference:

QUESTION 434
For which two protocols can PortFast alleviate potential host startup is-sues? (Choose two.)

A. DHCP
B. DNS
C. OSPF
D. RIP
E. CDP

Correct Answer: AB
Section: part 9
Explanation

Explanation/Reference:

QUESTION 435
What does it take for BGP to establish connection. (Choose two)

A. Enable cdp
B. AS number on local router
C. AS number on remote router
D. IGP
E. EGP

Correct Answer: BC
Section: part 9
Explanation

Explanation/Reference:
router bgp AS LOCAL
neighbor xxxx remote-as AS number on remote router

QUESTION 436
On which layer tcp/ip is ACL Apic-EM path

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Correct Answer: D
Section: part 9
Explanation

Explanation/Reference:

QUESTION 437
Which cloud service is typically used to provide DNS and DHCP services to an enterprise?

A. IaaS
B. DaaS
C. SaaS
D. PaaS

Correct Answer: A
Section: part 9
Explanation

Explanation/Reference:

QUESTION 438
Which three statements about Syslog utilization are true? (Choose three.)

A. Utilizing Syslog improves network performance


B. The Syslog server automatically notifies the network administrator of network problems
C. A Syslog server provides the storage space necessary to store log files without using router disk space
D. There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap
messages.
E. Enabling Syslog on a router automatically enables NTP for accurate time stamping
F. A Syslog server helps in aggregation of logs and alerts.

Correct Answer: CDF


Section: part 9
Explanation

Explanation/Reference:

QUESTION 439
What are the two statements about EUI-64 addressing? (Choose two)

A. A locally administrated address has the universal/local bit set to 0.


B. A 64-bit interface identifier is derived from the interface MAC address
C. A 96-bit interface identifier is derived from the interface MAC address
D. The address includes the hex digits FFFE after the first 24 bits of the interface MAC address
E. The address includes the hex digits FFFE after the last 24 bits of the interface MAC address

Correct Answer: BD
Section: part 9
Explanation

Explanation/Reference:
QUESTION 440
After you configure the ip dns spoofing command globally on a device,under which two conditions is DNS
spoofing enabled on the device?(choose two)

A. The DNS server queue limit id disabled


B. The ip host command is disabled
C. All configured IP name server addresses are removed
D. The ip dns spoofing command is disabled on the local interface
E. The no ip domain lookup command is configured

Correct Answer: CE
Section: part 9
Explanation

Explanation/Reference:

QUESTION 441
which task must you perform to enable an IOS device to use DNS services?

A. configure a relay agent information reforwarding policy


B. configure manual bindings
C. configure the relay agent information option
D. configure a name server

Correct Answer: B
Section: part 9
Explanation

Explanation/Reference:

QUESTION 442
Which two IP SLA operations can you use to measure the end-to-end response time for all IP traffic
between a Cisco router and an end device ?(choose two)

A. UDP jitter
B. ICMP path jitter
C. TCP connect
D. ICMP path echo
E. ICMP echo
F. UDP echo

Correct Answer: DE
Section: part 9
Explanation

Explanation/Reference:
To measure end-to-end reponse time we have to use ICMP echo to continuously ping to a remote device.
The difference between ICMP path echo and ICMP echo is the former can measure hop-by-hop response
time on its whole path while the latter can only measure to a specific destination.

QUESTION 443
What authentication type is used by SNMPv2 ?

A. username and password


B. community strings
C. HMAC-MD5
D. HMAC-SHA

Correct Answer: B
Section: part 9
Explanation

Explanation/Reference:

QUESTION 444
Which MAC protocol sets a random timer to reattempt communication ?

A. RARP
B. CSMA/CA
C. CSMA/CD
D. IEEE 802.1x

Correct Answer: C
Section: part 9
Explanation

Explanation/Reference:

QUESTION 445
While troubleshooting a GRE tunnel interface issue,show interface command output displays tunnel status
up,but line protocol is down.
Which reason for this problem is most likely ?

A. The route to the tunnel destination address is through the tunnel itself
B. The next hop server is misconfigured
C. The interface has been administratively shut down
D. The tunnel was just reset

Correct Answer: A
Section: part 9
Explanation

Explanation/Reference:

QUESTION 446
Which two statements about stacking Cisco switches are true ?(choose two)

A. It enables the administrator to manage multiple switches from a single management interface
B. The administrator can create only one stack of switches in a network which is under the same
administrative domian
C. When a new master switch is elected,it queries the previous master for its running configuration
D. The administrator can add additional switches to the stack as demand increases
E. Each switch manages its own MAC address table

Correct Answer: AD
Section: part 9
Explanation
Explanation/Reference:

QUESTION 447
Router R1 has a static route that is configured to destination network.A directly
connected interface is configured with an IP address in the same destination
network.Which statement about R1 is true?

A. R1 refuses to advertise the dynamic route to other neighbors


B. R1 prefers the static route
C. R1 prefers the directly connected interface
D. R1 sends a withdrawal notification to the neighboring router

Correct Answer: C
Section: part 9
Explanation

Explanation/Reference:

QUESTION 448
Which type of address is the public IP address of a NAT device?

A. outside public
B. inside local
C. inside global
D. inside public
E. outside global
F. outside local

Correct Answer: C
Section: part 9
Explanation

Explanation/Reference:

QUESTION 449
Which configuration register value can you set on a Cisco device so that it ignores the
NVRAM when it boots?

A. 0x2124
B. 0x2120
C. 0x2142
D. 0x2102

Correct Answer: C
Section: part 9
Explanation
Explanation/Reference:

QUESTION 450
Which two benefits can you get by stacking Cisco switches?(choose two)

A. Each switch in the stack handles the MAC table independently from the others
B. You can add or remove switches without taking the stack down.
C. Each switch in the stack can use a different IOS image
D. The stack enables any active member to take over as the master switch if the existing
master fails.
E. You can license the entire stack with a single master license

Correct Answer: BD
Section: part 9
Explanation

Explanation/Reference:

QUESTION 451
Which command can you enter to verify that a router is synced with a configures time
source?

A. show ntp authenticate


B. ntp associations
C. ntp server time
D. ntp authenticate
E. show ntp associations

Correct Answer: E
Section: part 10
Explanation

Explanation/Reference:

QUESTION 452
two statements about LLDP are true ?(choose two)

A. It uses mandatory TLVs to discover the neighboring devices


B. It functions at Layer 2 and Layer 3
C. It is a Cisco-proprietary technology
D. It is implemented in accordance with the 802.11a specification
E. It enables systems to learn about one another over the data-link layer

Correct Answer: AE
Section: part 10
Explanation

Explanation/Reference:

QUESTION 453
A network administrator enters the following command on a router:logging trap 3 .
What are three message types that will be sent to the Syslog server?(choose three)

A. warning
B. informational
C. error
D. emergency
E. debug
F. critical

Correct Answer: CDF


Section: part 10
Explanation

Explanation/Reference:

QUESTION 454
Refer to the exhibit. Which statement is true?

A. The Fa0/11 role confirms that SwitchA is the root bridge for VLAN 20.
B. VLAN 20 is running the Per VLAN Spanning Tree Protocol
C. The MAC address of the root bridge is 0017.596d.1580.
D. SwitchA is not the root bridge, because not all of the interface roles are designated
Correct Answer: D
Section: part 10
Explanation

Explanation/Reference:
stp对于跟桥所有的接口都是指定端口

QUESTION 455
Which technology allows a large number of private IP addresses to be represented by a
smaller number of public IP addresses?

A. NAT
B. NTP
C. RFC 1631
D. RFC 1918

Correct Answer: A
Section: part 10
Explanation

Explanation/Reference:

QUESTION 456
Which two types of NAT addresses are used in a Cisco NAT device? (Choose two.)

A. inside local
B. inside global
C. inside private
D. outside private
E. external global
F. external local

Correct Answer: AB
Section: part 10
Explanation

Explanation/Reference:

QUESTION 457
Refer to the exhibit.A new subnet with 60 hosts has been added to the network.Which subnet address
should this network use to provide enough usable addresses while wasting the fewest addresses?

A. 192.168.1.56/27
B. 192.168.1.64/26
C. 192.168.1.64/27
D. 192.168.1.56/26

Correct Answer: B
Section: part 10
Explanation

Explanation/Reference:
要考虑到图中已经用掉的网段

QUESTION 458

Refer to the exhibit.If the devices produced the given output,what is the cause of the EtherChannel
problem?

A. There is a speed mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfaces.
B. There is an MTU mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfaces
C. There is an encapsulation mismatch between SW1's Fa0/1 and SW2's Fa0/1 interface
D. SW1's Fa0/1 interface is administratively shut down.

Correct Answer: A
Section: part 10
Explanation

Explanation/Reference:
EtherChannel中两个端口需要speed一致

QUESTION 459
Which option is a valid IPv6 address?
A. 2001:0000:130F::099a::12a
B. 2002:7654:A1AD:61:81AF:CCC1
C. FEC0:2927:1860:W067::2A4
D. 2004:1:25A4:886F::1

Correct Answer: D
Section: part 10
Explanation

Explanation/Reference:
A.只能一个冒号
B.应该8个字段
C.16进制没有WXYZ

QUESTION 460
Which two statements about configuring an Ether Channel on a Cisco switch are true?(Choose two)

A. The interfaces configured in the Ether Channel must have the same STP port path cost
B. The interfaces configured in the Ether Channel must be on the same physical switch
C. An Ether Channel can operate in Layer 2 mode only
D. The interfaces configured in the Ether Channel must operate at the same speed and duplex mode
E. The interfaces configured in the Ether Channel must be part of the same VLAN or trunk

Correct Answer: BD
Section: part 10
Explanation

Explanation/Reference:

QUESTION 461
Which two statements about IPv6 anycast addresses are true?( Choose two)

A. They receive packets on the closest interface that is discovered by the routing protocol
B. They are allocated from the IPv6 broadcast address space
C. They are used in conjunction with source-specific multicast for IPv6
D. They use the prefix FC00::/8
E. They arr allocated from the IPv6 unicast address space

Correct Answer: AE
Section: part 10
Explanation

Explanation/Reference:

QUESTION 462
What is the first step in the NAT configuration process?

A. Define inside and outside interfaces


B. Define public and private IP addresses
C. Define IP address pools
D. Define global and local interfaces

Correct Answer: A
Section: part 10
Explanation

Explanation/Reference:
QUESTION 463
It you change the weight and distance parameters on a device with an establshed BGP neighbor, which
additional task must you perfom to allow the two devices to continue exchanging routes?

A. Reset the BGP connections on the device


B. Reset the gateway interface
C. Clear the IP routes on the device
D. Change the weight and distance settings on the other device to match

Correct Answer: A
Section: part 10
Explanation

Explanation/Reference:
Once you have defined two routers to be BGP neighbors, they will form a BGP connection and exchange
routing information. If you subsequently change a BGP filter, weight, distance, version, or timer, or make a
similar configuration change, you must reset BGP connections for the configuration change to take effect.
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/15-s/irg-15-s-book/irg-basic-
net-0.html

QUESTION 464
Which two features can you enable on a switch to capture and analyze frames that transt an interface?
(Choose two)

A. SNMP
B. NetFlow
C. IP SLA
D. SPAN
E. RSPAN

Correct Answer: DE
Section: part 10
Explanation

Explanation/Reference:

QUESTION 465
Which two characteristics of an ICMP echo-based IP SLA are true? (Choose two)

A. It can use RSPAN to report network statistics to a designated remote port


B. It aggregates traffic statistics for reporting on a configurable basis
C. It requires a remote device to log and maintain collected data
D. It measures traffic to determine the reliability of a connection from a Cisco router to a designated end
device
E. It generates continuous traffic to monitor network performance

Correct Answer: DE
Section: part 10
Explanation

Explanation/Reference:

QUESTION 466
Which two are features of IPv6?(choose two)

A. multicast
B. broadcast
C. allcast
D. podcast
E. anycast

Correct Answer: AE
Section: part 10
Explanation

Explanation/Reference:

QUESTION 467
Which two statements about Cisco Discovery Protocol are true?(Choose two)

A. It is used to initiate a VTP server and cient relationship


B. It uses SNMP to share device information to an external server
C. It runs on the network layer and the data link layer.
D. It runs on the data link layer only
E. It uses TLVs to share device information

Correct Answer: DE
Section: part 10
Explanation

Explanation/Reference:

QUESTION 468
Which two QoS tools can provide congestion management?(Choose two)

A. CBWFQ
B. FRTS
C. CAR
D. PQ
E. PBR

Correct Answer: AD
Section: part 10
Explanation

Explanation/Reference:

QUESTION 469
Refer to the diagram. All hosts have connectivity with one another. Which statements describe the
addressing scheme that is in use in the network? (Choose three.)
A. The subnet mask in use is 255.255.255.192
B. The subnet mask in use is 255.255.255.128
C. The IP address 172.16.1.25 can be assigned to hosts in VLAN1
D. The IP address 172.16.1.205 can be assigned to hosts in VLAN1
E. The LAN interface of the router is configured with one IP address.
F. The LAN interface of the router is configured with multiple IP addresses.

Correct Answer: BCF


Section: part 10
Explanation

Explanation/Reference:

QUESTION 470
A national retail chain needs to design an IP addressing scheme to support a nationwide network. The
company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet.
Working with only one Class B address, which of the following subnet masks will support an appropriate
addressing scheme? (Choose two.)

A. 255.255.255.0
B. 255.255.255.128
C. 255.255.252.0
D. 255.255.255.224
E. 255.255.255.192
F. 255.255.248.0

Correct Answer: BE
Section: part 10
Explanation

Explanation/Reference:
一个国家的零售连锁店需要设计一个IP方案来支持一个全国性的网络互联。该公司需要最少300个子网段以
及每个子网段最多50太主机。仅使用一个B类地址,下列中哪些子网掩码能够满足这个地址分配方案?
需要至少300个子网,每个子网至少50台主机。使用一个B类地址来划分。
考点分析:这道题考的是VLSM。
整个网络最少有300个子网,2的9次方是512大于300,且是B类网络,所以网络位至少,9+16=25个;
每个网段最多50机器,且2^5<50<2^6,主机位至少是6位;
综上两个条件,掩码只能是/25和/26
A:最多有256个子网,错误
C:只有64个子网
D:每个子网只有30个可用IP
F:只有32个子网。
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 471
which two statements describe key differences between single- and dual-homed WAN connections?
(Choose two)

A. Dual-homed WAN connections are more expensive than single-homed connections


B. Dual-homed WAN connections have more management-application overhead than single-homed
connections
C. Dual-homed WAN connections require more skill to administer than single-homed connections
D. Dual-homed WAN connections have a simpler topology than single-homed connections
E. Dual-homed WAN connections have higher WAN speed than single- homed connections

Correct Answer: AC
Section: part 10
Explanation

Explanation/Reference:

QUESTION 472
which two values are needed to run the APIC-EM ACL Analysis tool ?(choose two)

A. destination address
B. destination port
C. periodic refresh intervlan
D. source address
E. protocol
F. source port

Correct Answer: AD
Section: part 10
Explanation

Explanation/Reference:

QUESTION 473
Which QOS feature can drop traffic that exceeds the committed access rate?

A. weighted fair queuing


B. FIFO
C. policing
D. shaping

Correct Answer: C
Section: part 10
Explanation

Explanation/Reference:

QUESTION 474
Which two criteria must be met to support the ICMP echo IP SLA? (Choose two)

A. The destination device must support the echo protocol


B. default gateway must be configured for the source and destination devices
C. The source device must be running Layer 2 services.
D. The source and destination devices must be Cisco devices
E. The source device must be a Cisco device but the destination device can be from any vendor

Correct Answer: AE
Section: part 10
Explanation

Explanation/Reference:

QUESTION 475
What SNMP message alerts the manager to a condition on the network?

A. trap
B. get
C. response
D. capture

Correct Answer: A
Section: part 10
Explanation

Explanation/Reference:

QUESTION 476
In which STP state does MAC address learning take place on a PortFast-enabled port?

A. listening
B. forwarding
C. discarding
D. learning

Correct Answer: B
Section: part 10
Explanation

Explanation/Reference:

QUESTION 477
Refer to the exhibit. A network technician is asked to design a small network with redundancy. The exhibit
represents this design, with all hosts configured in the same VLAN. What conclusions can be made about
this design?
A. The design will function as intended
B. Spanning-tree will need to be used
C. The router will not accept the addressing scheme
D. The connection between switches should be a trunk.
E. The router interfaces must be encapsulated with the 802.1Q protocol.

Correct Answer: C
Section: part 10
Explanation

Explanation/Reference:
路由器的接口上不会出现同一网段的两个IP地址,这样的IP地址是配置不上去的

QUESTION 478
For which two reasons might you choose chassis aggregation instead of stacking switches?(Choose two)

A. to allow hot-swapping modules


B. to increase the number of devices in use
C. to avoid the use of a centralized configuration manager
D. to avoid relying solely on Ethemet interfaces
E. to increase the maximum port count

Correct Answer: AB
Section: part 10
Explanation

Explanation/Reference:

QUESTION 479
Which two benefits of implementing a full-mesh WAN topology are true?(Choose two)

A. increased latency
B. redundancy
C. improved scalability
D. reliability
E. reduced itter

Correct Answer: BD
Section: part 10
Explanation

Explanation/Reference:

QUESTION 480

Refer to the exhibit. Traffic on the control plane uses which VLAN ?

A. VLAN 1
B. VLAN 5
C. VLAN 10
D. VLAN 20

Correct Answer: A
Section: part 10
Explanation

Explanation/Reference:
CDP, VTP, and PAgP updates are always forwarded on trunks with a VLAN 1 tag. This is the case even if
VLAN 1 has been cleared from the trunks and is not the native VLAN. If you clear VLAN 1 for user data, the
action has no impact on control plane traffic that is still sent with the use of VLAN 1.
https://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/24330-185.html#pre6

QUESTION 481
Which two conditions can be used to elect the spanning-tree root bridge?(choose two)

A. the highest MAC address


B. the lowest MAC address
C. the highest port priority
D. the lowest system ID
E. the lowest switch priority

Correct Answer: BE
Section: part 10
Explanation

Explanation/Reference:

QUESTION 482
Which type of device should you use to preserve IP addresses on your network?

A. firewall
B. WLAN controller
C. load balancer
D. intrusion prevention device

Correct Answer: A
Section: part 10
Explanation

Explanation/Reference:

QUESTION 483
What two actions can be taken to secure the virtual teminal interfaces on a router?(choose two)

A. Administratively shut down the interface


B. Enter an access list and apply it to the virtual terminal interfaces using the access-class command
C. Physically secure the interface
D. Create an access list and apply it to the virtual terminal interfaces using the access-group command
E. Configure a virtual terminal password and logi process

Correct Answer: BE
Section: part 10
Explanation

Explanation/Reference:

QUESTION 484
Which two cable specifications can support 1-Gbps Ethernet? (choose two)

A. Category 5e
B. RG11
C. RG-6
D. Category 6
E. Category 3

Correct Answer: AD
Section: part 10
Explanation

Explanation/Reference:

QUESTION 485
Which value is included in the initial TCP syn message?
A. a session ID
B. sequence number
C. a TTL number
D. an acknowledgment number

Correct Answer: B
Section: part 10
Explanation

Explanation/Reference:

QUESTION 486
At which severity level can syslog logging begin to affect router performance?

A. debugging
B. emergency
C. notification
D. critical

Correct Answer: D
Section: part 10
Explanation

Explanation/Reference:

QUESTION 487
Refer to the exhibit.What is the effect of the configuration?

A. Traffic from PC A is dropped when it uses the trunk to communicate with PC B


B. Traffic from PC A is sent untagged when it uses the trunk to communicate with PC B
C. Traffic from PC B is dropped when it uses the trunk to communicate with PC A
D. Traffic from PC B is sent untagged when it uses the trunk to communicate with PCA

Correct Answer: C
Section: part 10
Explanation

Explanation/Reference:

QUESTION 488
Which effete does the aaa new-model coniguration commandhave?

A. It enables AAA services on the device


B. It configures the device to connect to a RADIUS server for AAA
C. It associates a RADIUS server to an AAA group.
D. It configures a local user on the device.

Correct Answer: A
Section: part 10
Explanation

Explanation/Reference:

QUESTION 489
Cisco lOS supports which QoS models?

A. best effort and integrated services


B. integrated services and differentiated services
C. best- effort and differentiated services
D. best-effort, integrated services, and difrentiated services

Correct Answer: D
Section: part 10
Explanation

Explanation/Reference:

QUESTION 490
What happens when you add a switch running an earier IOS version to a SackWise configration running a
later
version ?

A. The stack ignores the switch until you update the IOS version on the switch.
B. The switch software downgrades the IOS version on the stack to match the version on the switch
C. The switch software upgrades the IOS version on the switch to match the version on the stack
D. The switch keeps its version of IOS and runs normally as part of the stack

Correct Answer: C
Section: part 10
Explanation

Explanation/Reference:

QUESTION 491
Which command should you enter to configure a single port to enter an err-disabled state when it receives
an infenior BPDU?
A. spanning-tree portfast bpduguard
B. spanning-tree guard root
C. spanning-tree portfast default
D. spanning-tree portfast bpdufilter

Correct Answer: A
Section: part 10
Explanation

Explanation/Reference:

QUESTION 492
Which two statements correctly describe RADIUS?(Choose two)

A. It separates authentication, authorization, and accounting functions


B. It uses TCP as its transport protocol
C. It encrypts only the password
D. It combines authentication and authorization
E. I can authorize specific router commands

Correct Answer: CD
Section: part 10
Explanation

Explanation/Reference:

QUESTION 493
Which two operational modes are supported on the members of a StackWise switch stack?(Choose two)

A. power-sharing
B. passive
C. active
D. redundant
E. standby

Correct Answer: CE
Section: part 10
Explanation

Explanation/Reference:

QUESTION 494
In which three ways is an IPv6 header simpler than an IPv4 header? (Choose three.)

A. Unlike IPv4 headers, IPv6 headers have a fixed length


B. IPv6 uses an extension header instead of the IPv4 Fragmentation field.
C. IPv6 headers eliminate the IPv4 Checksum field.
D. IPv6 headers use the Fragment Offset field in place of the IPv4 Fragmentation field
E. IPv6 headers use a smaller Option field size than IPv4 headers.
F. IPv6 headers use a 4-bit TTL field, and IPv4 headers use an 8-bit TTL field.

Correct Answer: ABC


Section: part 10
Explanation

Explanation/Reference:

QUESTION 495
Which IPv6 address is the all-router multicast group?

A. FF02::1
B. FF02::2
C. FF02::3
D. FF02::4

Correct Answer: B
Section: part 10
Explanation

Explanation/Reference:
IPV6的所有路由器组播地址为FF02::2。
IPV4的所有路由器组播地址为224.0.0.2
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 496
Refer to the exhibit. Given the output shown from this Cisco Catalyst 2950, what is the most likely reason
that interface FastEthernet 0/10 is not the root port for VLAN 2?

A. This switch has more than one interface connected to the root network segment in VLAN 2.
B. This switch is running RSTP while the elected designated switch is running 802.1d Spanning Tree.
C. This switch interface has a higher path cost to the root bridge than another in the topology.
D. This switch has a lower bridge ID for VLAN 2 than the elected designated switch.

Correct Answer: C
Section: part 10
Explanation

Explanation/Reference:

QUESTION 497
Which NAT function can map multiple inside addresses to a single outside address?

A. PAT
B. SFTP
C. RARP
D. ARP
E. TFTP

Correct Answer: A
Section: part 10
Explanation
Explanation/Reference:

QUESTION 498
which API use HTTP meddages to tansfer data to applications residing on different host ?

A. OpFlex
B. REST
C. OpenStack
D. OpenFlow

Correct Answer: B
Section: part 10
Explanation

Explanation/Reference:

QUESTION 499
which command can you enter on a Cisco IOS device to enable a scheduled algorithm that directs lookup
calls to multiple DNS hosts?

A. ip domain round-robin
B. ip name-server 192.168.10.14 192.168.10.15
C. ip domain lookup
D. ip domain list

Correct Answer: B
Section: part 10
Explanation

Explanation/Reference:

QUESTION 500
which two services can be provided by a wireless controller?(choose two)

A. issuing IP addresses to wired devices


B. mitigating threats from the internet
C. providing authentication services to users
D. managing interference in a dense network
E. Layer 3 routing between wired and wireless devices

Correct Answer: CD
Section: part 10
Explanation

Explanation/Reference:

QUESTION 501
Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network.The network
administrator connected to console port,issued the show ip route command,and was able to ping the
server.Based on the output of the show ip route command topology shown in the graphic,what is the cause
of the failure?
A. IP routing is not enabled
B. A static route is configured incorrectly
C. The network has not fully converged
D. The FastEthernet interface on Coffee is disabled
E. The routing table on Coffee has not updated
F. The neighbor relationship table is not correctly updated

Correct Answer: D
Section: part 11
Explanation

Explanation/Reference:
题干说172.17.22.0 network不能连接172.31.5.0 network中的服务器,但是coffee路由器可以ping通。如果不
看题目给出的路由表,很容易可以选择D答案。题目中路由表给出一条错误的默认路由,如果这条路由是错
的,路由器coffee也不能ping通服务器,再者配置下一跳地址不存在的默认路由不会出现在路由表中,由此
可见,此题中的错误默认路由是一个陷阱或是出题者的失误。
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 502
Refer to the exhibit. The network administrator must establish a route by which London workstations can
forward traffic to the Manchester workstations. What is the simplest way to accomplish this?

A. Configure a dynamic routing protocol on London to advertise all routes to Manchester.


B. Configure a dynamic routing protocol on London to advertise summarized routes to Manchester
C. Configure a dynamic routing protocol on Manchester to advertise a default route to the London router.
D. Configure a static default route on London with a next hop of 10.1.1.1.
E. Configure a static route on London to direct all traffic destined for 172.16.0.0/22 to 10.1.1.2.
F. Configure Manchester to advertise a static default route to London.

Correct Answer: E
Section: part 11
Explanation

Explanation/Reference:
网络管理员必须建立一条目的从伦敦的网络转发到曼彻斯特的网络,最简单的方法是什么?
london 要访问manchester的主机,那么我们只要知道那个一个静态路由讲数据包发出去就可以,通过子网
汇总172.16.0.0/22可以代表manchester的3个网段。并且制定吓一跳为10.1.1.2
-----------鸿鹄论坛http://bbs.hh010.com/

QUESTION 503
Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following
are true? (Choose two.)

A. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.
B. Router C will use ICMP to inform Router B that Host 2 cannot be reached.
C. Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached.
D. Router C will send a Destination Unreachable message type.
E. Router C will send a Router Selection message type.
F. Router C will send a Source Quench message type.

Correct Answer: AD
Section: part 11
Explanation

Explanation/Reference:
因为RC的e0口down,所以主机1的数据包到达RC后,RC向主机返回一个icmp的目的地不可达信息

QUESTION 504
which two statements correctly describe distance-vector routing protocols?(choose two)

A. they specify the next hop toward the destination subnet


B. they require quick network convergence to support normal operations
C. they generate a complete topology of the network
D. they update other devices on the network when one device detects a topogy chage
E. they use a variety of metrics to identify the distance to a destination network.

Correct Answer: AD
Section: part 11
Explanation

Explanation/Reference:
http://bbs.hh010.com

QUESTION 505
which command is needed to send RIPV2 updates as broadcast?

A. ip rip receive version 2


B. ip rip receive version 1
C. version 2
D. ip rip v2-broadcast

Correct Answer: D
Section: part 11
Explanation

Explanation/Reference:

QUESTION 506
Which two TLVs does LLDP support?(choose two)

A. system description
B. port duplex
C. management address
D. native VLAN
E. spanning tree

Correct Answer: AC
Section: part 11
Explanation

Explanation/Reference:

QUESTION 507
After you deploy a new WLAN controller on your network,which two additional tasks should you consider ?
(choose two)

A. deploy load balancers


B. configure additional vlans
C. configure multiple VRRP groups
D. deploy POE switches
E. configure additional security policies

Correct Answer: AE
Section: part 11
Explanation

Explanation/Reference:

QUESTION 508
When you are troubleshooting an ACL issue on a router,which command would you use to verify which
interfaces are affected by the ACL?

A. show interface
B. list ip interface
C. show access-list
D. show ip interface
E. show ip access-list

Correct Answer: D
Section: part 11
Explanation

Explanation/Reference:
http://bbs.hh010.com

QUESTION 509
Which technology provides chassis redundancy in a VSS environment?

A. BFD
B. multichassis EtherChannels
C. VRRP
D. StackWise

Correct Answer: B
Section: part 11
Explanation

Explanation/Reference:

QUESTION 510
Which LLDP extension provides additional support for VoIP?

A. TLV
B. LLDP-MED
C. LLDPv3
D. LLDP-VOIP

Correct Answer: B
Section: part 11
Explanation

Explanation/Reference:

QUESTION 511
Which two statements about stateful firewalls in an enterprise network are true ?(choose two)

A. They are more susceptible to DoS attacks than stateless firewalls


B. They can filter HTTP and HTTPS traffic in the inbound direction only
C. They are most effective when placed in front of the router connected to the internet
D. They can track the number of active TCP connections
E. They can use information about previous packets to make decisions about future packets

Correct Answer: DE
Section: part 11
Explanation

Explanation/Reference:

QUESTION 512
Which two statements about static routing are true? (Choose two.)
A. Its default administrative distance is lower than EIGRP.
B. Its provides only limited security unless the administrator performs additional configuration
C. Its allows packets to transit a different path if the topology changes.
D. Its initial implementation is more complex than OSPF
E. Its allows the administrator to determine the entire path of a packet

Correct Answer: AE
Section: part 11
Explanation

Explanation/Reference:
http://bbs.hh010.com

QUESTION 513
Which two functions primary responsibilities of the APIC-EM controller? (Choose two.)

A. It makes network functions programmable


B. It provides robust asset management
C. It tracks license usage and Cisco lOS versions.
D. It automates network actions between legacy equipment
E. It automates network actions between different device types

Correct Answer: AE
Section: part 11
Explanation

Explanation/Reference:

QUESTION 514
which command allows you to set the administrative distance for EIGRP for IPV6?

A. ipv6 summary-address eigrp


B. metric weights
C. ipv6 bandwidth-percent eigrp
D. ipv6 next-hop-self eigrp

Correct Answer: A
Section: part 11
Explanation

Explanation/Reference:

QUESTION 515
Which command would you configure globally on a Cisco router that would allow you to view directly
connected Cisco devices?

A. enable cdp
B. run cdp
C. cdp enable
D. cdp run
Correct Answer: D
Section: part 11
Explanation

Explanation/Reference:

QUESTION 516
Which type of access list compares source and destination IP address?

A. standard
B. extended
C. IP named
D. reflexive

Correct Answer: B
Section: part 11
Explanation

Explanation/Reference:
http://bbs.hh010.com

QUESTION 517
Which two descriptions of TACACS+ are true?(Choose two.)

A. It encrypts only the password.


B. It uses UDP as its transport protocol.
C. It separates authentication authorization, and accounting functions.
D. It can authorize specific router commands.
E. It combines authentication and authorization

Correct Answer: CD
Section: part 11
Explanation

Explanation/Reference:

QUESTION 518
Which utility can you use to identify redundant or shadow rules?

A. the ACL trace tool in Cisco APIC-EM


B. the Cisco IWAN application
C. the Cisco APIC-EM automation scheduler
D. the ACL analysis tool in Cisco APIC-EM

Correct Answer: D
Section: part 11
Explanation

Explanation/Reference:

QUESTION 519
Which benefit of implementing a dual-homed WAN connection instead of a single-homed connection is true
?

A. Only dual-homed connections support OSPF in conjunction with BGP


B. Only dual-homed connections support split horizon with EIGRP
C. Only dual-homed connections enbable an individual router to tolerate the loss of a network link
D. Only dual-homed connections support recursive routing

Correct Answer: C
Section: part 11
Explanation

Explanation/Reference:

QUESTION 520
Which two commands can you use to verify an IP SLA ?(choose two)

A. show ip sla application


B. show ip sla reaction-configuration
C. show ip sla statistics
D. show ip sla configuration

Correct Answer: CD
Section: part 11
Explanation

Explanation/Reference:
http://bbs.hh010.com

QUESTION 521

Refer to the exhibit Which BGP configuration do you need to apply to router R4 to allow traffic to flow
normally on this network ?

A. router bgp1
no synchronization
neighbor 192.168.1.1 remote-as 1
neighbor 192.168.1.1 ebgp-multihop 4
neighbor 192.168.2.1 remote-as 1
neighbor 192.168.2.1 ebgp-multihop 4
neighbor 192.168.3.1 remote-as 5
no auto-summary
B. router bgp1
no synchronization
neighbor 192.168.1.1 remote-as 1
neighbor 192.168.2.1 remote-as 1
neighbor 192.168.3.1 remote-as 5
no auto-summary
C. router bgp1
no synchronization
neighbor 192.168.1.1 remote-as 1
neighbor 192.168.2.1 remote-as 1
neighbor 192.168.2.1 ebgp-multihop 4
neighbor 192.168.3.1 remote-as 5
no auto-summary
D. router bgp1
no synchronization
neighbor 192.168.1.1 remote-as 1
neighbor 192.168.1.1 ebgp-multihop 4
neighbor 192.168.2.1 remote-as 1
neighbor 192.168.2.1 ebgp-multihop 4
neighbor 192.168.3.1 remote-as 5
neighbor 192.168.3.1 ebgp-multihop 4
no auto-summary

Correct Answer: B
Section: part 11
Explanation

Explanation/Reference:

QUESTION 522
what are two advantages of static routing ?(choose two)

A. It can bei implemented easily even in large environments


B. It produces minimal CPU load
C. It cannot be used to load-balance traffic over multiple links
D. It allows the administrator to control the path of traffic
E. It allows the network to respond immediately to changes

Correct Answer: BD
Section: part 11
Explanation

Explanation/Reference:

QUESTION 523
Under which two circumstances is a switch port that is configured with PortFast BPDU guard error-disable?
(choose two)

A. when the switch receives a request for an IP address from an individual PC


B. when the switch receives a BPDU from a connected switch
C. when a wireless access point running in bridge mode is connected to a switch
D. when a single IP address is configured on the switch
E. when a connected server has more than one VLAN configured on its NIC

Correct Answer: BC
Section: part 11
Explanation

Explanation/Reference:

QUESTION 524
Which command can you enter to set the default route for all traffic to an IP enable router interface ?

A. router(config)#ip route 0.0.0.0 255.255.255.255 GigabitEthernet0/1


B. router(config)#ip default-gateway GigabitEthernet0/1
C. router(config)#default-information originate
D. router(config)#ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1

Correct Answer: D
Section: part 11
Explanation

Explanation/Reference:

QUESTION 525
Which two statements about IPv6 multicast address are true ?(choose two)

A. If the liftime parameter is set to 1,the route is permanent.


B. They use the prefix FC80::/8
C. They use the prefix FF00::/8
D. They identify a group of interfaces on different devices
E. If the scope parameter is set to 5,the route is local to the node

Correct Answer: CD
Section: part 11
Explanation

Explanation/Reference:

QUESTION 526
Which two EtherChannel PAgP modes can you configure ?(choose two)

A. desirable
B. active
C. auto
D. on
E. passive

Correct Answer: AC
Section: part 11
Explanation

Explanation/Reference:

QUESTION 527
Which two neighbor types are supported in BGP environment?(choose two)

A. external
B. autonomous
C. remote
D. internal
E. directly attached

Correct Answer: AD
Section: part 11
Explanation

Explanation/Reference:

QUESTION 528
Which two statements about 1000BASE-T UTP cable are true ?(choose two)
A. It use four wires
B. It is most appropriate for installations up to 1000 feet in length
C. It uses four wire pairs
D. It is most appropriate for installations up to 1000 meters in length
E. Both ends of the cable can transmit and receive simultaneously

Correct Answer: CE
Section: part 11
Explanation

Explanation/Reference:

QUESTION 529
Refer to the exhibit.

What is the effect of the given configuration?

A. It configures an inactive switch virtual interface.


B. It configures an active management interface.
C. It configures the native VLAN.
D. It configures the default VLAN.

Correct Answer: A
Section: part 11
Explanation

Explanation/Reference:

QUESTION 530
You are configuring an IP SLA ICMP Echo operation to troubleshoot a network connectivity issue.When do
you enter an IP address to test the IP SLA?

A. when you enable the ICMP Echo operation


B. when you define the ICMP Echo operation
C. when you specify the test frequency
D. when you verify the IP SLA operation

Correct Answer: B
Section: part 11
Explanation

Explanation/Reference:

QUESTION 531
which option is the primary purpose of traffic shaping?
A. enabling policy-based routing
B. providing best-effort service
C. limiting bandwidth usage
D. enabling dynamic flow identification

Correct Answer: C
Section: part 11
Explanation

Explanation/Reference:

QUESTION 532
which two differences between distance-vector and link-state routing protocols are true?(choose two)

A. only distance-vector routing protocols maintain identical topology tables on all connected neighbors
B. distance-vector routing protocols are less susceptible to loops than link-state protocols
C. only distance-vector routing protocols send full routing table updates
D. only link-state routing protocols use the Bellman-Ford algorithm
E. Link-state routing protocols offer faster convergence than distance-vector protocols during network
changes

Correct Answer: CE
Section: part 11
Explanation

Explanation/Reference:

QUESTION 533
Which three elements are fields in a basic Ethernet data frame?(choose three)

A. Length/Type
B. Frame Check Sequence
C. Version
D. Preamble
E. Time to Live
F. Header Checksum

Correct Answer: ABD


Section: part 11
Explanation

Explanation/Reference:

QUESTION 534
Which three features are represented by the letter A in AAA authentication?(choose three)

A. authentication
B. authorization
C. authority
D. accounting
E. accessibility
F. accountability

Correct Answer: ABD


Section: part 11
Explanation

Explanation/Reference:

QUESTION 535
Which prompt dose a Cisco switch display when it is running in privileged exec mode ?

A. switch(config-if)#
B. switch#
C. switch(config)#
D. switch>

Correct Answer: B
Section: part 11
Explanation

Explanation/Reference:

QUESTION 536

Refer to the exibit .An attempt to deny web access to a subnet blocks all traffic from the subnet.Which
interface command immedicately removes the effect of ACL 102?

A. no ip access-group 102 in
B. no ip access-group 102 out
C. no ip access-list 102 in
D. no ip access-class 102 out
E. no ip access-class 102 in

Correct Answer: B
Section: part 11
Explanation
Explanation/Reference:
在端口应用ACL是 ip access-group 命令。Ip access-class是在VTY应用的命令。

QUESTION 537
Which effect of the terminal monitor command is true ?

A. It puts the device into global configuration mode


B. It configures the device to log messages to the console
C. It displays the configuration of the syslog server
D. It configures a syslog server

Correct Answer: B
Section: part 11
Explanation

Explanation/Reference:

QUESTION 538
For which routes does the distance bgp 10 50 70 command set the administrative distance?

A. for BGP internal routes only


B. for all BGP routes
C. for BGP external routes only
D. between BGP routes and IGP routes

Correct Answer: B
Section: part 11
Explanation

Explanation/Reference:

QUESTION 539
Which command must you enter to switch from privileged EXEC mode to user EXEC mode on a Cisco
device?

A. configure terminal
B. logout
C. disable
D. enable

Correct Answer: C
Section: part 11
Explanation

Explanation/Reference:

QUESTION 540
You are implementing WAN access for an enterprise network while running applications that require a fully
meshed network,which two design standards are appropriate for such an environment?(choose two)

A. multiple MPLS VPN connections with static routing


B. multiple MPLS VPN connections with dynamic routing
C. a collapsed core and distribution layer,to minimize costs
D. a collapsed WAN distribution layer,to consolidate connectivity to remote sites
E. a collapsed DMVPN solution,to simplify connectivity for the enterprise
Correct Answer: BE
Section: part 11
Explanation

Explanation/Reference:

QUESTION 541
which feature can cause a port to shut down immediately after a switch reboot ?

A. port security
B. DTP
C. COPP
D. PortFast

Correct Answer: A
Section: part 11
Explanation

Explanation/Reference:

QUESTION 542
Which two statements about the ip subnet-zero command are true?(Choose two)

A. It is enabled by default on Cisco routers


B. It must be configured before you activate NAT on a router
C. It specifies the broadcast IP addresses in the subnet
D. It must be configured each time you reboot a router
E. It enables the network to make full use of the available IP address space

Correct Answer: AE
Section: part 11
Explanation

Explanation/Reference:

QUESTION 543
Which protocol speeds up the MAC aging process?

A. OSPF
B. RSTP
C. RIP
D. 802.1D

Correct Answer: B
Section: part 11
Explanation

Explanation/Reference:

QUESTION 544
Which algorithm is used for the frame check sequence in an Ethernet frame?

A. MD5
B. AES-256
C. CRC
D. SHA-1

Correct Answer: C
Section: part 11
Explanation

Explanation/Reference:

QUESTION 545
Which file-system management command is used frequently when lOS backups, upgrades,and restores
are performed?

A. show dir
B. show file
C. delete
D. copy

Correct Answer: D
Section: part 11
Explanation

Explanation/Reference:

QUESTION 546

Refer to the exhibit Which two pieces of information can you determine from the EIGRP topology table?
(choose two)

A. Route 10.42.88.0/21 has an administrative distance of 28160


B. Route 10.42.91.0/24 has a tag of 28160
C. Each route has only one best path
D. The EIGRP neighbor IP address is 10.111 253.216
E. The reported distance of 10.0.0.0/8 is 0

Correct Answer: CE
Section: part 11
Explanation

Explanation/Reference:

QUESTION 547
Which command must you enter to configure a DHCP relay?
A. ip helper-address
B. ip address dhcp
C. ip dhcp relay
D. ip dhcp pool

Correct Answer: A
Section: part 11
Explanation

Explanation/Reference:

QUESTION 548
Which two best practices protect your network from VLAN hopping attacks?(choose two)

A. Change the native VLAN to an unused VLAN ID


B. Assign all access ports to VLANS other than the native VLAN
C. Configure an ACL to prevent traffic from changing VLANS.
D. Configure dynamic ARP inspection
E. Configure port security

Correct Answer: AB
Section: part 11
Explanation

Explanation/Reference:

QUESTION 549
Which two statements about IGP and EGP routing protocols are true? (Choose two)

A. Service providers use OSPF and IS-IS for intra-AS routing


B. EGP routing protocols are used to connect multiple IGP networks.
C. OSPF, EIGRP, and BGP are categorized as IGP routing protocols
D. Service providers use EGP and BGP for intra- AS routing.
E. IGP routing protocols are used within internal networks.

Correct Answer: AB
Section: part 11
Explanation

Explanation/Reference:

QUESTION 550
Which two statements about GRE tunnels are true? (Choose two.)

A. They can operate in tunnel mode and transport mode


B. They provide privacy, integrity, and authenticity
C. They encapsulate the payload.
D. They add 8 bytes to the IP header of each packet.
E. They allow multicast traffic to traverse WAN circuits

Correct Answer: CE
Section: part 11
Explanation

Explanation/Reference:

QUESTION 551

Refer to the exhibit. Which two statements about the interface that generated the output are true?(choose
two)

A. Two secure MAC address are manually configured on the interface.


B. A syslog message is generated when the maximum number of secure MAC addresses is reached on
the interface
C. The interface is error -disabled.
D. The interface dynamically learned two secure MAC addresses
E. An SNMP trap is generated when the maximum number of secure MAC addresses is reached on the
interface

Correct Answer: CD
Section: part 12
Explanation

Explanation/Reference:

QUESTION 552

Refer to the exhibit Which two facts can you determine from the EIGRP topology table? (Choose two)

A. If a route has more than one successor, only one route is injected into the routing table.
B. The FD 28416 for route 10.242. 0.148 is also the metric for the routing table
C. The variance command must have been issued to allow route 10.85.184.0 to have two Successors.
D. The reported distance value is greater than the feasible distance
E. All successors are injecting into the routing table

Correct Answer: BE
Section: part 12
Explanation

Explanation/Reference:

QUESTION 553
Which extended ping feature do you use to specify the path that the packet traverses?

A. verbose
B. timestamp
C. strict
D. record

Correct Answer: C
Section: part 12
Explanation

Explanation/Reference:

QUESTION 554
Which command should you enter to configure a single port to bypass the spanning-tree Forward and Delay
timers?

A. spanning-tree portfast bpdufiter default


B. spanning-tree portfast default
C. spanning-tree portfast
D. spanning-tree portfast bpduguard default

Correct Answer: C
Section: part 12
Explanation

Explanation/Reference:

QUESTION 555
You apply an new inbound access fist to routers, blocking UDP packets to the HSRP group. Which two
effects does this action have on the HSRP group process? (Choose
two.)

A. HSRP redundancy works as expected


B. HSRP redundancy fails
C. The active router immediately becomes the standby router.
D. Both the active and standby routers become active.
E. The routers in the group generate duplicate IP address warnings

Correct Answer: BD
Section: part 12
Explanation
Explanation/Reference:

QUESTION 556
Which two statements about PAP authentication in a PPP environment are true?(Choose two)

A. It is performed at the beginning of the session only.


B. It hashes the password before sending it.
C. It sends the password in clear text.
D. It is performed at the beginning of the session and is repeated periodically for as long as the session is
maintained
E. It uses a username with an MD5 password to authenticate

Correct Answer: AC
Section: part 12
Explanation

Explanation/Reference:

QUESTION 557
Which two commands can you use to configure an LACP EtherChannel? (Choose two)

A. channel-group 10 mode on
B. channel-group 10 mode auto
C. channel-group 10 mode passive
D. channel-group 10 mode desirable
E. channel-group 10 mode active

Correct Answer: CE
Section: part 12
Explanation

Explanation/Reference:

QUESTION 558
After you configure a DHCP server on VLAN 10 to service clients on VLAN 10 and VLAN 20. clients on
VLAN 10 are given IP address assignments,but clients on
VLAN 20 fail to receive IP addresses. Which action must you take to correct the problem?

A. Configure the ip helper address command in the DHCP server configuration.


B. Configure the DNS name option in the DHCP server configuration
C. Configure a separate DHCP server on VLAN 20
D. Configure the default gateway in the DHCP sever configuration

Correct Answer: C
Section: part 12
Explanation

Explanation/Reference:

QUESTION 559
Which chassis aggregation technology combines two physical switches into one virtual switch?

A. VSS
B. LACP
C. StackWise
D. VRRP

Correct Answer: A
Section: part 12
Explanation

Explanation/Reference:

QUESTION 560
Which two values must you specify to define a static route? (Choose two.)

A. destination network and mask


B. source network and mask
C. incoming interface
D. next-hop address or exit interface
E. administrative distance of the route

Correct Answer: AD
Section: part 12
Explanation

Explanation/Reference:

QUESTION 561
Which two approaches are common when troubleshooting network issues? (Choose two.)

A. round-robin
B. divide and conquer
C. policing
D. top down
E. layer-by-layer

Correct Answer: BD
Section: part 12
Explanation

Explanation/Reference:

QUESTION 562
which two statements about RFC 1918 addresses are true? (Choose two.)

A. They have reserved address space for Class A and Class B networks only.
B. They increase network performance.
C. They require Network Address Translation or Port Address Translation to access the Internet
D. They must be registered.
E. They provide security to end users when the users access the Internet

Correct Answer: CE
Section: part 12
Explanation

Explanation/Reference:
QUESTION 563
Which two statements about the ip default-network command are true? (Choose two.)

A. It requires IP routing to be disabled on the device.


B. It specifies the network that is used when the device finds an exact match in the routing table.
C. It specifies the network that is used when the device cannot find an exact match in the routing table
D. It can be configured on a Layer 2 switch to specify the next hop.
E. It requires IP routing to be enabled on the device.

Correct Answer: CE
Section: part 12
Explanation

Explanation/Reference:

QUESTION 564
Which two facts about configuring EIGRPv6 are true? (Choose two.)

A. You must configure neighboring devices with the same ipv6 hello-interval eigrp value
B. If you change the interface delay, the EIGRPv4 delay remains unchanged.
C. The variance command for EIGRPv6 is independent of EIGRPv4.
D. If you change the interface bandwidth, the EIGRPv4 metric is afected.
E. The router ID must be an IPv6 address.

Correct Answer: CD
Section: part 12
Explanation

Explanation/Reference:

QUESTION 565

Refer to the exhibit The server on this network is configured with an MTU of 9216 and the two interfaces on
router R1 are configured for MTUs of 2000 and 3000, as
shown. What is the largest packet size that can pass between the workstation and the server?

A. 1500 bytes
B. 2000 bytes
C. 3000 bytes
D. 9216 bytes

Correct Answer: A
Section: part 12
Explanation

Explanation/Reference:

QUESTION 566
On which combinations are standard access lists based?

A. destination address and wildcard mask


B. source address and wildcard mask
C. destination address and subnet mask
D. source address and subnet mask

Correct Answer: B
Section: part 12
Explanation

Explanation/Reference:
标准控制列表使用源地址和通配符

QUESTION 567
Which destination addresses will be used by Host A to send data to Host C? (Choose two.)

A. the IP address of Switch 1


B. the MAC address of Switch 1
C. the IP address of Host C
D. the MAC address of Host C
E. the IP address of the router's E0 interface
F. the MAC address of the router's E0 interface

Correct Answer: CF
Section: part 12
Explanation

Explanation/Reference:
数据包在转发的过程中,源目IP不变,源目MAC会变化。
目的地不在同一个网段,数据先发送到网关。

QUESTION 568
which two values must you specify to perform an ACL-based Path Trace using APIC-EM?(choose two)

A. source port
B. source IP address
C. destination IP address
D. source interface
E. destination port
Correct Answer: BC
Section: part 12
Explanation

Explanation/Reference:

QUESTION 569
Which two task does a router perform when it receives a packet that is being forwarded from one network
to another?(choose two)

A. It encapsulates the layer 2 packet


B. It examines the MAC address table for the forwarding interface
C. It removes the layer 2 frame header and trailer
D. It examines the routing table for the best path to the destination IP address of the packet
E. It removes the layer3 frame header and trailer

Correct Answer: CD
Section: part 12
Explanation

Explanation/Reference:

QUESTION 570
You have configured a router with an OSPF router ID,but its IP address still reflects the physical
interface.Which action can you take to correct the problem in the least disruptive way?

A. Reload the OSPF process


B. Reload the router
C. Save the router configuration
D. Specify a loopback address

Correct Answer: D
Section: part 12
Explanation

Explanation/Reference:

QUESTION 571
Which command is configured on a switch to enable neighbor discovery in a multivendor environment?

A. cdp run
B. lldp receive
C. lldp transmit
D. lldp run

Correct Answer: D
Section: part 12
Explanation

Explanation/Reference:
QUESTION 572
Which two functions can be performed by local DNS server?(choose two)

A. copying updated IOS images to cisco switches


B. resolving names locally
C. transferring split horizon traffic between zones
D. assigning IP addresses to local clients
E. forwarding name resolution requests to an external DNS server

Correct Answer: BE
Section: part 12
Explanation

Explanation/Reference:

QUESTION 573
What is the default Syslog facility level?

A. local 6
B. local 7
C. local 5
D. local 4

Correct Answer: B
Section: part 12
Explanation

Explanation/Reference:

QUESTION 574
Refer to the exhibit.HostA cannot ping HostB.Assuming routing is properly configured,what could be the
cause of this problem?

A. HostA is not on the same subnet as its default gateway


B. The address of SwitchA is a subnet address
C. The Fa0/0 interface on RouterA is on a subnet that cannot be used
D. The serial interfaces of the routers are not on the same subnet
E. The Fa0/0 interface on RouterB is using a broadcast address

Correct Answer: D
Section: part 12
Explanation

Explanation/Reference:
QUESTION 575
Which two advantages do dynamic routing protocols provide over static routing (choose two)

A. Dynamic routing protocols are easier to manage on very large networks


B. Dynamic routing protocols automatically adapt to reroute traffic if possible
C. Only dynamic routing is supported on all topologies that require multiple routers
D. Dynamic routing is more secure than static routing
E. Dynamic routing requires fewer resources than static routing

Correct Answer: AB
Section: part 12
Explanation

Explanation/Reference:

QUESTION 576
Which two server types are used to support DNS lookup(choose two)

A. web server
B. name resolver
C. authoritative name sever
D. ESX host
E. file transfer server

Correct Answer: BC
Section: part 12
Explanation

Explanation/Reference:

QUESTION 577
which task do you need to perform first when you configure IP SLA to troubleshoot a network Connectivity
issue ?

A. Enable the ICMP echo operation


B. Specify the test frequency
C. Verify the ICMP echo operation
D. Schedule the ICMP operation

Correct Answer: A
Section: part 12
Explanation
Explanation/Reference:

QUESTION 578
Which plane handles switching traffic through a Cisco router?

A. control
B. management
C. data
D. performance

Correct Answer: C
Section: part 12
Explanation

Explanation/Reference:

QUESTION 579
which two statements correctly describe the ping utility?(choose two))

A. it uses ICMP
B. it can identify source of an ICMP “time exceeded”message
C. it can identify the path that a packet takes to a remote device
D. it can verify connectivity to a remote device without identifying the path
E. it use UDP

Correct Answer: AD
Section: part 12
Explanation

Explanation/Reference:

QUESTION 580
which access layer threat mitigation technique security by acting as a filter between
trusted and untrusted traffic sources?

A. DHCP snooping
B. 802.1X
C. dynamic packet inspection
D. a nondefault native VLAN

Correct Answer: B
Section: part 12
Explanation

Explanation/Reference:

QUESTION 581
Which value is included in the initial TCP SYN message?
A. a sequence number
B. a TTL number
C. an acknowledgment number
D. a session ID

Correct Answer: A
Section: part 12
Explanation

Explanation/Reference:

QUESTION 582
which two address spaces are valid Class B IPV4 ranges that are non-routable to the
internet?(choose two)

A. 10.0.0.0 through 10.0.255.255


B. 169.254.0.0 through 169.254.255.255
C. 172.16.0.0 through 172.31.255.255
D. 172.16.0.0 through 172.32.255.255
E. 192.168.0.0 through 192.168.255.255

Correct Answer: BC
Section: part 12
Explanation

Explanation/Reference:

QUESTION 583
which command should you enter to configure a single port to prevent alternate ports
from becoming designated ports?

A. spanning-tree etherchannel misconfig


B. spanning-tree guard root
C. spanning-tree loopguard default
D. spanning-tree guard loop

Correct Answer: D
Section: part 12
Explanation

Explanation/Reference:

QUESTION 584
which circumstance is a common cause of late collisions?

A. native VLAN mismatch


B. overloaded hardware queues
C. duplex mismatch
D. software misconfiguration

Correct Answer: C
Section: part 12
Explanation

Explanation/Reference:

QUESTION 585
which two facts must you table into account when you deploy PPPoE?(choose two)

A. You must manually configure IP addresses on the PPPoE interface


B. DDR is not supported
C. DDR idle timers must be configured to support VPDN logging
D. PPPoE supports a maximum of 10 clients per customer premises equipment
E. An individual PVC can support one PPPoE client

Correct Answer: CD
Section: part 12
Explanation

Explanation/Reference:

QUESTION 586
Which two circumstances can prevent two routers from establishing an OSPF neighbor
adjacency? (Choose two.)

A. mismatched autonomous system numbers


B. an ACL blocking traffic from multicast address 224.0.0.10
C. mismatched process IDs
D. mismatched hello timers and dead timers
E. use of the same router ID on both devices

Correct Answer: DE
Section: part 12
Explanation

Explanation/Reference:

QUESTION 587
After an FTP session to ftp.cisco.com fails,you attempt to ping the server.A ping to
ftp.cisco.com also fails,but a ping to the IP address of the server is successful.What is
reason for the failed FTP session ?

A. The assigned DNS server is down


B. An ACL is blocking the FTP request
C. A firewall is blocking traffic from the FTP site
D. The internet connection is down

Correct Answer: A
Section: part 12
Explanation

Explanation/Reference:

QUESTION 588
You have configured a router with an OSPF router ID, but its IP address still reflects the
physical interface.Which action can you take to correct the problem in the least disruptive
way?

A. Reload the OSPF process.


B. Specify a loopback address
C. Reboot the router.
D. Save the router configuration

Correct Answer: B
Section: part 12
Explanation

Explanation/Reference:

QUESTION 589
Which two statements about an Ethernet frame source address are true? (Choose two.)

A. The address is 4 bits long.


B. The leftmost bit is always 0.
C. The address is 6 bytes long.
D. The leftmost bit is always 1.
E. The address is 4 bytes long

Correct Answer: BC
Section: part 12
Explanation

Explanation/Reference:
Source Address (SA) - The source address consists of six bytes, and it is used to identify
the sending station. As it is always an individual address the left most bit is always a
zero.
QUESTION 590
Which two features are compatible with port security? (Choose two)

A. SPAN destination port


B. voice VLAN
C. DTP
D. EtherChannel
E. SPAN source port

Correct Answer: BE
Section: part 12
Explanation

Explanation/Reference:
You can configure port security only on Layer 2 interfaces. Details about port security
and different types ofinterfaces or ports are as follows:
Access ports--You can configure port security on interfaces that you have configured as
Layer 2 access ports. On an access port, port security applies only to the access VLAN.
Trunk ports--You can configure port security on interfaces that you have configured as
Layer 2 trunk ports. VLAN maximums are not useful for access ports. The device allows
VLAN maximums only for VLANs associated with the trunk port.
SPAN ports--You can configure port security on SPAN source ports but not on SPAN
destination ports.
Ethernet Port Channels--Port security is not supported on Ethernet port channels.
QUESTION 591
Which feature or method can you use to isolate physical layer problems on a serial link?

A. loopback tests
B. autonegotiation
C. UDLD
D. protocol analyzer

Correct Answer: A
Section: part 12
Explanation

Explanation/Reference:

QUESTION 592
Which switching method checks for CRC errors?

A. store-and-forward
B. cut-through
C. fragment-free
D. Layer 3

Correct Answer: A
Section: part 12
Explanation

Explanation/Reference:
In cut-through switching, the switch copies into its memory only the destination MAC
address (first six bytes of the frame) of the frame. After processing these first six bytes,
the switch had enough information to make a forwarding decision and move the frame to
the appropriate switchport. This switching method is faster than store-and-forward
switching method.
In store-and-forward switching, the switch copies each complete Ethernet frame into the
switch memory and computes a Cyclic Redundancy Check (CRC) for errors. If a CRC
error is found, the Ethernet frame is dropped. If no CRC error is found then that frame is
forwarded.

QUESTION 593
Which two actions must you take to correctly configure PPPoE on a client? (Choose
two )

A. Define a dialer interface


B. Create a dialer pool and bind it to the virtual template
C. Define a virtual template interface
D. Create a dialer pool and bind it to the physical interface.
E. Create a BBA group and link it to the dialer interface

Correct Answer: AD
Section: part 12
Explanation

Explanation/Reference:

QUESTION 594

Refer to the exhibit.which two statements about router R1 are true?(choose two)

A. the router has two EIGRP neighbors and one OSPF neighbor
B. at least two IGP routing protocols are running on the router
C. at least three IGP routing protocols are running on the router
D. the router is learning external OSPF and EIGRP routes
E. the router has an OSPF Area 0 adjacency with the device at 10.82.4.42

Correct Answer: BD
Section: part 12
Explanation

Explanation/Reference:

QUESTION 595
Which two benefits are provided by cloud resources to an enterprise network?(Choose
two )

A. full control of infrastructure


B. complexity at higher cost
C. flexibility
D. on-demand scalability
E. easy access with low security

Correct Answer: CD
Section: part 12
Explanation

Explanation/Reference:

QUESTION 596
Which two pieces of information can you determine from the output of the show ntp
status command? (Choose two)

A. whether the NTP peer is statically configured


B. the IP address of the peer to which the clock is synchronized
C. the configured NTP servers
D. whether the clock is synchronized
E. the NTP version number of the peer

Correct Answer: BD
Section: part 12
Explanation

Explanation/Reference:

QUESTION 597
which two technologies can combine multiple physical switches into one logical switch?
(Choose two)

A. HSRP
B. GLBP
C. StackWise
D. VRRP
E. VSS

Correct Answer: CE
Section: part 12
Explanation

Explanation/Reference:

QUESTION 598
which symbol in the APIC-EM Path Trace tool output indicates that an ACL is present
and might deny packets?

A.
B.

C.
D.

Correct Answer: C
Section: part 12
Explanation

Explanation/Reference:

QUESTION 599
What are two reasons to use multicast to deliver video traffic, instead of unicast or
broadcas?(choose two)

A. it provides reliable TCP transport


B. it enables multiple clients to receive the video stream simultaneously
C. it enables multiple servers to send video streams simultaneously
D. it enables multiple clients to send video streams simultaneously
E. it supports distributed applications

Correct Answer: BE
Section: part 12
Explanation

Explanation/Reference:

QUESTION 600
which two task should you perform to begin troubleshooting a network problem?(choose
two)

A. Gather all the facts


B. Define the problem as a set of symptoms and causes
C. Monitor and verify the resolution
D. Analyze the resu
E. Implement an action plan

Correct Answer: AB
Section: part 12
Explanation

Explanation/Reference:

QUESTION 601
What are two benefits that the UDP protocol provide for application traffic?(Choose two)

A. UDP traffic has lower overhead than TCP traffic


B. UDP provides a built-in recovery mechanism to retransmit lost packets.
C. The CTL field in the UDP packet header enables a three-way handshake to establish
the connection
D. UDP maintains the connection state to provide more stable connections than TCP.
E. The application can use checksums to verify the integrity of application data

Correct Answer: AE
Section: part 13
Explanation

Explanation/Reference:

QUESTION 602
Which two statements about the successor and feasible successor are true?(Choose
two)

A. The successor is stored in the routing table


B. The feasible successor has a lower metric than the successor
C. The successor is the primary route
D. The successor is the secondary route
E. The feasible successor is stored in both the topology table and the routing table

Correct Answer: AC
Section: part 13
Explanation

Explanation/Reference:

QUESTION 603
Which two statements about UTP cables are true? (Choose two)

A. Category 6 Ethernet cables are appropriate for installations of up to 200m


B. Category 6a Ethernet cable can transmit up to 10 Gbps
C. All Ethernet cable types from Category 1 through Category 6 are suitable for
transmitting data m the appropriate environments
D. Category 5 Ethernet cables support speeds up to 1000 Mbps beyond 100m.
E. Category 5e Ethernet cables support speeds up to 1000 Mbps

Correct Answer: BE
Section: part 13
Explanation

Explanation/Reference:
QUESTION 604
Which two statements about TACACS+ are true? (Choose two)

A. It combines authentication and authorization to simplify configuration


B. it uses UDP port 49
C. It supports full command logging
D. It uses TCP port 49.
E. It encrypts the password only

Correct Answer: CD
Section: part 13
Explanation

Explanation/Reference:

QUESTION 605
Which keyboard shortcut can you use to exit the System Configuration Dialog on a Cisco
networking device and return to privileged EXEC mode without making changes?

A. Ctrl+Alt+Delete
B. Shift-Esc
C. Ctrl-C
D. Ctrl-v

Correct Answer: C
Section: part 13
Explanation

Explanation/Reference:

QUESTION 606
What is the maximum number of switches that StackWise can support in one stack?

A. 6
B. 8
C. 9
D. 10

Correct Answer: C
Section: part 13
Explanation

Explanation/Reference:

QUESTION 607
Which two circumstances can prevent two routers from establishing an EIGRP neighbor
adjacency?(choose two)

A. Both routers have the same router ID.


B. The two routers have the same autonomous system number
C. An ACL is blocking traffic from multicast address 224 0 0.5.
D. The routers have mismatched K values.
E. The routers are on different subnets

Correct Answer: DE
Section: part 13
Explanation

Explanation/Reference:

QUESTION 608
which two commands should you enter to prevent a Cisco device from Sharing
information with upstream device?(choose two)

A. R1(config)#no cdp enable


B. R1(config-if)#no cdp run
C. R1(config)#no cdp run
D. R1(config)#no cdp advertise-v2
E. R1(config-if)#no cdp enable

Correct Answer: CE
Section: part 13
Explanation

Explanation/Reference:

QUESTION 609
what is the minimum Ethernet frame size?

A. 32bytes
B. 64bytes
C. 1024bytes
D. 1500bytes

Correct Answer: B
Section: part 13
Explanation

Explanation/Reference:

QUESTION 610
which two commands should you enter to view the PID and serial number of a router?
(choose two)

A. show license udi


B. show license status
C. show license
D. show version
E. show license feature

Correct Answer: AD
Section: part 13
Explanation
Explanation/Reference:

QUESTION 611
Which two statements about PDU encapsulation are true? (Choose two)

A. PDU encapsulation takes place only at the transport layer


B. In the TCP/IP reference model, PDU encapsulation occurs on the network layer
C. During encapsulation each layer adds a header and trailer to the PDU from the layer
below
D. During encapsulation, each layer adds a header and sometimes adds a trailer to the
PDU from the layer above
E. In the TCP/IP reference model ,PDU encapsulation starts on the Internet layer with
the data from the application layer.

Correct Answer: AD
Section: part 13
Explanation

Explanation/Reference:

QUESTION 612
which Rapid PVST+ port role provides a different path to the root bridge?

A. designated
B. forwarding
C. backup
D. alternate

Correct Answer: D
Section: part 13
Explanation

Explanation/Reference:

QUESTION 613

Refer to the exhibit.which two statements about the interface that generated the output
are true?(choose two)
A. learned MAC addresses are deleted after five minutes of inactivity
B. the interface is error-diabled if packets arrive from a new unknown source address
C. it has dynamically learned two secure MAC addresses
D. it has dynamically learned three secure MAC addresses
E. the security violation counter increments if packets arrive from a new unknown source
address

Correct Answer: AC
Section: part 13
Explanation

Explanation/Reference:

QUESTION 614
which two goals reasons to implement private IPv4 addressing on your network?(choose
two)

A. Comply with PCI regulations


B. Conserve IPv4 address
C. Reduce the size of the forwarding table on network routers
D. Reduce the risk of a network security breach
E. Comply with local law

Correct Answer: BD
Section: part 13
Explanation

Explanation/Reference:

QUESTION 615
what is the easiest way to verify the Layer 3 path from a router to host 192.168.2.1?

A. Use Telnet to connect the router to host 192.168.2.1


B. Execute a traceroute from the router to host 192.168.2.1
C. Add a static route for host 192.168.2.1 to the routing table of the router
D. Execute a ping from the router to host 192.168.2.1

Correct Answer: B
Section: part 13
Explanation

Explanation/Reference:

QUESTION 616
Which two statements about RIPv2 are true? (Choose two )

A. It stores RIP neighbor adjacency information in a neighbor table.


B. It does not support clear text authentication, similar to RIPv1.
C. It uses the Bellman-Ford routing algorithm
D. It supports CIDR and VLSM
E. It sends periodic updates via broadcast

Correct Answer: AC
Section: part 13
Explanation

Explanation/Reference:
RIPv2不支持CIDR
QUESTION 617
which frame type allows STP to compute the spanning-tree topology?

A. BPDU
B. RSTP
C. LSA
D. LSP

Correct Answer: A
Section: part 13
Explanation

Explanation/Reference:

QUESTION 618

Refer to the exhibit.Which two events occur on the interface,if packets from an unknown
Source address arrive after the interface learns the maximum number of secure MAC
address?(choose two)

A. The security violation counter dose not increment


B. The port LED turns off
C. The interface is error-disabled
D. A syslog message is generated
E. The interface drops traffic from unknown MAC address

Correct Answer: AE
Section: part 13
Explanation

Explanation/Reference:
QUESTION 619
Which command should you enter to configure a device as an NTP sever?

A. ntp sever
B. ntp peer
C. ntp authenticate
D. ntp master

Correct Answer: D
Section: part 13
Explanation

Explanation/Reference:

QUESTION 620
Which adverse circumstance can occur when you connect when you connect full-duplex
devices to a shared Ethernet hub?

A. excessive collisions
B. alignment errors
C. a duplex mismatch
D. native VLAN mismatches

Correct Answer: A
Section: part 13
Explanation

Explanation/Reference:

QUESTION 621
What is the simplest IP SLA operation that can measure end-to-end response time
between device?

A. CMP path jitter


B. ICMP path echo
C. ICMP jitter
D. ICMP echo

Correct Answer: D
Section: part 13
Explanation

Explanation/Reference:

QUESTION 622
which value is used to build the CAM table?

A. source IP address
B. destination IP address
C. destination MAC address
D. source MAC address

Correct Answer: D
Section: part 13
Explanation

Explanation/Reference:

QUESTION 623
which two pieces of information can you learn by viewing the routing table?(choose two)

A. whether an ACL was applied inbound or outbound to an interface


B. the EIGRP or BGP autonomous system
C. whether the administrative distance was manually or dynamically configured
D. which neighbor adjacencies are established
E. the length of time that a route has been known

Correct Answer: CE
Section: part 13
Explanation

Explanation/Reference:

QUESTION 624
which command should you enter to configure a DHCP client?

A. ip dhcp pool
B. ip dhcp client
C. ip helper-address
D. ip address dhcp

Correct Answer: D
Section: part 13
Explanation

Explanation/Reference:

QUESTION 625
which IP address can send traffic to all hosts on network10.101.0.0/16?

A. 10.101.0.1
B. 10.101.254.254
C. 10.101.255.255
D. 244.0.0.1

Correct Answer: C
Section: part 13
Explanation

Explanation/Reference:

QUESTION 626
Which two commands can you use to configure an PAgP EtherChannel? (Choose two)

A. channel-group 10 mode on
B. channel-group 10 mode auto
C. channel-group 10 mode passive
D. channel-group 10 mode desirable
E. channel-group 10 mode active

Correct Answer: BD
Section: part 13
Explanation

Explanation/Reference:

QUESTION 627
which command should you enter to verify the priority of a router in an HSRP group?

A. show hsrp
B. show sessions
C. show interfaces
D. show standby

Correct Answer: D
Section: part 13
Explanation

Explanation/Reference:

QUESTION 628

Refer to the exhibit.If all routers on this network run RIPv2,which two configurations can
you apply to router R3 to produce this routing table?(choose two)

A. router rip
version 2
network 192.168.3.0
network 192.168.4.0
network 192.168.23.0
passive-interface default
B. router rip
version 2
network 192.168.3.0
network 192.168.23.0
passive-interface default
C. router rip
version 2
network 192.168.3.0
network 192.168.4.0
network 192.168.23.0
D. router rip
version 2
network 192.168.3.0
network 192.168.4.0

Correct Answer: AB
Section: part 13
Explanation

Explanation/Reference:

QUESTION 629
Which two commands can you use to configure an actively negotiate EtherChannel?
(Choose two)

A. channel-group 10 mode on
B. channel-group 10 mode auto
C. channel-group 10 mode passive
D. channel-group 10 mode desirable
E. channel-group 10 mode active

Correct Answer: DE
Section: part 13
Explanation

Explanation/Reference:

QUESTION 630
what happens to new traffic is sent to a destination MAC address after the MAC aging
time expires?

A. it is flooded
B. it is dropped
C. it is process-switched
D. it is queued

Correct Answer: A
Section: part 13
Explanation

Explanation/Reference:

QUESTION 631
Refer to the exhibit.Which two statements about the network environment of router R1
must be true?(choose two)

A. there are 20 different network masks within the 10.0.0.0/8 network


B. A static default route to 10.85.33.14 was defined
C. Ten routes are equally load-balanced between Te0/1/0.100 and Te0/2/0.100
D. The 10.0.0.0/8 network was learned via external EIGRP
E. The EIGRP administrative distance was manually changed from 90 to 170

Correct Answer: AC
Section: part 13
Explanation

Explanation/Reference:

QUESTION 632

Refer to the exhibit.How will switch SW2 handle traffic from VLAN 10 on SW1?

A. It sends the traffic to VLAN 100


B. It sends the traffic to VLAN 1
C. It drops the traffic
D. It sends the traffic to VLAN 10

Correct Answer: A
Section: part 13
Explanation

Explanation/Reference:

QUESTION 633
Which two statements about exterior routing protocols are true?(choose two)

A. They determine the optimal path between autonomous systems


B. They determine the optimal path within an autonomous systems
C. Most modern networking supports both EGP and BGP for external routing
D. Most modern network routes support both EGP and EIGRP for external routing
E. BGP is the current standard exterior routing protocol

Correct Answer: AE
Section: part 13
Explanation

Explanation/Reference:

QUESTION 634
Which two pieces of information about a Cisco device can Cisco Discovery Protocol
communicate?(choose two)
A. the spanning tree protocol
B. the spanning-tree priority
C. the native VLAN
D. the VTP domain
E. the trunking protocol

Correct Answer: CD
Section: part 13
Explanation

Explanation/Reference:

QUESTION 635
Which cloud service that usually provides software beyond the basic operating system is
normally used for development?

A. infrastructure-as-a-service
B. database-as-a-service
C. software-as-a-service
D. platform-as-a-service

Correct Answer: D
Section: part 13
Explanation

Explanation/Reference:

QUESTION 636
Which two statements about NTP operations are true?(choose two)

A. NTP uses UDP over IP


B. NTP uses TCP over IP
C. Cisco routers can act only as NTP clients
D. Cisco routers can act as both NTP authoritative severs and NTP clients
E. Cisco routers can act only as NTP servers

Correct Answer: AD
Section: part 13
Explanation

Explanation/Reference:

QUESTION 637
Frame flooding can occur in which circumstance?

A. The destination IP address is missing from the route table


B. The destination MAC address is missing from the CAM table
C. The source MAC address is missing from the CAM table
D. The source IP address is missing from the route table

Correct Answer: B
Section: part 13
Explanation

Explanation/Reference:

QUESTION 638
Which command should you enter to view the error log in an EIGRP for IPv6
environment?

A. show ipv6 eigrp traffic


B. show ipv6 eigrp topology
C. show ipv6 eigrp events
D. show ipv6 eigrp neighbors

Correct Answer: C
Section: part 13
Explanation

Explanation/Reference:

QUESTION 639
Which port status does the interface enter when UDLD detects a unidirectional link?

A. shutdown
B. up/up
C. down/down
D. errdisable

Correct Answer: D
Section: part 13
Explanation

Explanation/Reference:

QUESTION 640
which task should you perform before you use the APIC-EM Path Trace tool to perform
ACL analysis?

A. Verify that DNS is configured on the controller


B. Configure the IP address from which to generate the trace
C. Verify that the device of interest are included in the device inventory
D. Execute a standard traceroute to the destination

Correct Answer: C
Section: part 13
Explanation

Explanation/Reference:

QUESTION 641
Which feature or protocol is required for an IP SLA to measure UDP jitter?
A. LLDP
B. NTP
C. EEM
D. CDP

Correct Answer: B
Section: part 13
Explanation

Explanation/Reference:

QUESTION 642

Refer to the exhibit.If all routers on this network run RIPv2,which configuration should
you apply to router R3 to produce this routing table ?

A. router rip
network 192.168.3.0
network 192.168.4.0
network 192.168.23.0
passive-interface default
B. router rip
version 2
network 192.168.3.0
network 192.168.4.0
network 192.168.23.0
distance 70
passive-interface default
C. router rip
version 2
network 192.168.3.0
network 192.168.4.0
network 192.168.23.0
distance 50
D. router rip
version 2
network 192.168.3.0
network 192.168.23.0
distance 50

Correct Answer: D
Section: part 13
Explanation

Explanation/Reference:

QUESTION 643
Which two command sequences must you configure on a switch to establish a Layer 3
EtherChannel with an open-standard protocol?(choose two)

A. interface GigabitEthernet0/0/1
Channel-group 10 mode active
B. interface GigabitEthernet0/0/1
Channel-group 10 mode auto
C. interface GigabitEthernet0/0/1
Channel-group 10 mode on
D. interface port-channel 10
no switchport
ip address 172.16.0.1 255.255.255.0
E. interface port-channel 10
switchport
Switchport mode trunk

Correct Answer: AD
Section: part 13
Explanation

Explanation/Reference:

QUESTION 644
Refer to the exhibit.If the router attempts to send a frame out of the interface,but the
carrier is busy,which counter will increment?

A. lost carrier
B. late collision
C. deferred
D. collisions

Correct Answer: C
Section: part 13
Explanation

Explanation/Reference:
The deferred counter counts the number of times the interface has tried to send a frame, but found the
carrier busy at the first attempt (Carrier Sense). This does not constitute a problem, and is part of normal
Ethernet operation.

QUESTION 645
which two pieces of information can you learn by viewing the routing table?(choose two)

A. whether access list are blocking incoming routes


B. the interface on which traffic is send
C. whether a route was learned via IGP or EGP
D. whether routes were summarized
E. whether a route was tagged

Correct Answer: BC
Section: part 13
Explanation

Explanation/Reference:

QUESTION 646
Which three encapsulation layers in the OSI model are combined into the TCP/IP
application layer?(choose three)

A. transport
B. application
C. session
D. presentation
E. data link
F. network

Correct Answer: BCD


Section: part 13
Explanation

Explanation/Reference:

QUESTION 647
which command must you enter to guarantee that an HSRP router with higher priority
becomes the HSRP primary router after it is reloaded?

A. standby 10 priority
B. standby version 2
C. standby 10 preempt
D. standby 10 version 1

Correct Answer: C
Section: part 13
Explanation

Explanation/Reference:

QUESTION 648
Refer to the exhibit.Which statement about the interface that generated the output is
true?

A. Five secure MAC addresses are dynamically learned on the interface


B. A syslog message is generated when a violation occurs
C. One secure MAC address is manually configured on the interface
D. One secure MAC address is dynamically configured on the interface

Correct Answer: C
Section: part 13
Explanation

Explanation/Reference:

QUESTION 649
which two statements about link-state routing protocols are true?(choose two)

A. Each router determines its own path to a destination


B. Link-state routing protocols use split horizon to avoid routing loops
C. Each router shares a database of known routes
D. Each router is aware only of its neighbor routers
E. Each router maintains its own unique routing database

Correct Answer: AD
Section: part 13
Explanation

Explanation/Reference:

QUESTION 650
which two TCP messages use a 32-bit number as part of the initial TCP handshake?
(choose two)

A. FIN
B. RST
C. SYN
D. SYN-ACK
E. ACK

Correct Answer: CD
Section: part 13
Explanation

Explanation/Reference:

QUESTION 651
which two statement about DNS lookup operations are true?(choose two)

A. The client sends a request for domain name to IP address resolution to the DNS
server
B. When the primary IP address of the destination is down,the DNS server can forward
the client to an alternate IP address
C. The DNS server pings the destination to verify that it is available
D. The client sends a request for IP address to domain name resolution to the DNS
server
E. They use destination port 53

Correct Answer: AE
Section: part 13
Explanation

Explanation/Reference:

QUESTION 652
what are two common types of copper cable ?(choose two)

A. OM4
B. shielded twisted pair
C. single-mode
D. multimode
E. unshielded twisted pair

Correct Answer: BE
Section: part 13
Explanation

Explanation/Reference:

QUESTION 653
which command should you enter to configure an LLDP delay time of 5 seconds?

A. lldp timer 5000


B. lldp holdtime 5
C. lldp reinit 5000
D. lldp reinit 5

Correct Answer: D
Section: part 13
Explanation
Explanation/Reference:

QUESTION 654
which type of frame is larger than 9000 bytes?

A. runt
B. baby giant
C. giant
D. jumbo

Correct Answer: D
Section: part 13
Explanation

Explanation/Reference:

QUESTION 655
which layer of the TCP/IP model manages the transmission of binary digits across an
Ethernet cable ?

A. physical
B. network
C. transport
D. data link

Correct Answer: A
Section: part 13
Explanation

Explanation/Reference:

QUESTION 656
which effect does the switchport trunk native vlan 10 command have?

A. It allows traffic from native VLAN 10 on the trunk


B. It prevents traffic on VLAN 1 from passing on the trunk
C. It sets VLAN 10 as the native VLAN on the trunk
D. It configures the interface as a trunk port

Correct Answer: C
Section: part 13
Explanation

Explanation/Reference:

QUESTION 657
Which two tasks can help you gather relevant facts when you troubleshoot a network
problem?(choose two)

A. Eliminate known issues first


B. Define the problem in terms of symptoms and causes
C. Ask questions of the users who are affected by the problem
D. Change one setting or component and then analyze the result
E. Collect technical data from network management systems and logging servers

Correct Answer: BE
Section: part 13
Explanation

Explanation/Reference:

QUESTION 658
How does a Cisco IP phone handle untagged traffic that it receives from an attached PC
?

A. It drops the traffic


B. It tags the traffic with the native VLAN
C. It tags the traffic with the default VLAN
D. It allows the traffic to pass through unchanged

Correct Answer: D
Section: part 13
Explanation

Explanation/Reference:

QUESTION 659
Which feature or protocol determines whether the QOS on the network is sufficient to
support IP services?

A. LLDP
B. CDP
C. IP SLA
D. EEM

Correct Answer: C
Section: part 13
Explanation

Explanation/Reference:

QUESTION 660
which feature or protocol must you enbable so that the output of the show interface trunk
command includes information about native VLAN mismatches?

A. DTP
B. CDP
C. Portfast
D. RSTP

Correct Answer: B
Section: part 13
Explanation
Explanation/Reference:

QUESTION 661
which network appliance checks the state of a packet to determine whether the packet is
legitimate?

A. the firewall
B. the LAN controller
C. the load balancer
D. the Layer 2 switch

Correct Answer: A
Section: part 13
Explanation

Explanation/Reference:

QUESTION 662

Refer to the exhibit.When PC 1 sends a packet to PC2,the packet has which source and
destination IP address when it arrives at interface Gi0/0 on router R2?

A. source 192.168.10.10 and destination 10.10.2.2


B. source 192.168.20.10 and destination 192.168.20.1
C. source 192.168.10.10 and destination 192.168.20.10
D. source 10.10.1.1 and destination 10.10.2.2

Correct Answer: C
Section: part 13
Explanation

Explanation/Reference:

QUESTION 663
You notice that packets that are sent from a local host to a well-known service on TCP
port 80 of a remote host are sometimes lost.You suspect an ACL issue.Which two APIC-
EM path Trace ACL-analysis options should you use to troubleshoot the problem?
(choose two)

A. debug
B. protocol
C. QOS
D. performance Monitor
E. destination port

Correct Answer: CD
Section: part 13
Explanation

Explanation/Reference:

QUESTION 664
According to security best practices,which two actions must you take to protect an
unused switch port?(choose two)

A. Enable CDP
B. Configure the port as an access port on a VLAN other than VLAN 1
C. Configure the port to automatically come online
D. Administratively shut down the port
E. Configure the port as a trunk port

Correct Answer: BD
Section: part 13
Explanation

Explanation/Reference:

QUESTION 665
Which two VLAN ID indicate a default VLAN?(choose two)

A. 0
B. 1
C. 1005
D. 1006
E. 4096

Correct Answer: BC
Section: part 13
Explanation

Explanation/Reference:

QUESTION 666
In a CDP environment,what happens when the CDP interface on an adjacent device is
configured without an IP address?
A. CDP becomes inoperable on that neighbor
B. CDP uses the IP address of another interface for that neighbor
C. CDP operates normally,but it cannot provide IP address information for that neighbor
D. CDP operates normally,but it cannot provide any information for that neighbor

Correct Answer: C
Section: part 13
Explanation

Explanation/Reference:

QUESTION 667
which two pins does an RJ-45 connector use to transmit data?(choose two)

A. 1
B. 2
C. 3
D. 4
E. 6

Correct Answer: AB
Section: part 13
Explanation

Explanation/Reference:

QUESTION 668
Refer to the exhibit.Users in your office are complaining that they cannot connect to the
severs at a remote site.When troubleshooting,you find that you can successfully reach
the severs from router R2.What is the most likely reason that the other users are
experiencing connection failure?

A. interface ports are shut down on the remote servers


B. The DHCP address pool has been exhausted
C. The ip helper-address command is missing on the R2 interface that connects to the
switch
D. VLSM is misconfigured between the router interface and the DHCP pool.

Correct Answer: D
Section: part 13
Explanation

Explanation/Reference:

QUESTION 669
Which IOS troubleshooting tool should you use to direct system messages to your
screen?

A. terminal monitor
B. log events
C. local SPAN
D. APIC-EM

Correct Answer: A
Section: part 13
Explanation

Explanation/Reference:

QUESTION 670
which two protocols dose the internet layer in the TCP/IP model encapsulate?(choose
two)

A. DNS
B. SMTP
C. ICMP
D. ARP
E. TCP

Correct Answer: CD
Section: part 13
Explanation

Explanation/Reference:

You might also like